Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
order 20210407DTR001.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
order 20210407DTR001.exe
Resource
win10v2004-20231222-en
General
-
Target
order 20210407DTR001.exe
-
Size
1.6MB
-
MD5
6670c19ddf28b94dc9832ef37a4b976f
-
SHA1
6e6116fca5d75635c5906ed87db698fad545f087
-
SHA256
13d90261f73ecaa7455ccdaf16de6d96b122e8829cbf0ffe84ab89fc2cf4cad2
-
SHA512
979a3fb7ca18acba12a8c71d0893bc447826bfd4f1a7a6d13683c6ef00b315df4945e6a4cdf6da62c7a13a64c5aa56705c689e2847e7a267c592c0e48c55c35c
-
SSDEEP
24576:/uXy4mW5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ+H:GfhiectlWAdrHcVwM8NQuiNB/e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server291.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
riches22@123456
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2432-17-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation order 20210407DTR001.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DBqQu = "C:\\Users\\Admin\\AppData\\Roaming\\DBqQu\\DBqQu.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 532 set thread context of 2432 532 order 20210407DTR001.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 532 order 20210407DTR001.exe 2432 RegSvcs.exe 2432 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 532 order 20210407DTR001.exe Token: SeDebugPrivilege 2432 RegSvcs.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 532 wrote to memory of 4304 532 order 20210407DTR001.exe 102 PID 532 wrote to memory of 4304 532 order 20210407DTR001.exe 102 PID 532 wrote to memory of 4304 532 order 20210407DTR001.exe 102 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101 PID 532 wrote to memory of 2432 532 order 20210407DTR001.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\order 20210407DTR001.exe"C:\Users\Admin\AppData\Local\Temp\order 20210407DTR001.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Ouvuudly" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5157.tmp"2⤵
- Creates scheduled task(s)
PID:4304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD505bdc49eb9f7b1b34a27b9079c3186b1
SHA1d913d8747e52c3a2e00e4072f814b325433d54df
SHA256d6e602becb5db39c3e3073aaa5b3ce23e0a1fcc0b9d4e1efa263d80f042825f7
SHA51212010e1f1cf3660f097bcf695e9b989638c5336d0f92b5e183db4d67c0b32b44fc13166aa9da7b96982633359fb61ebb3a5b385014aa87183b87b3f02e0de8e3