Analysis
-
max time kernel
154s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 06:00
Static task
static1
Behavioral task
behavioral1
Sample
rev_new order2024pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
rev_new order2024pdf.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
General
-
Target
rev_new order2024pdf.exe
-
Size
532KB
-
MD5
1a81a4bbb804f4d4c3567b8f4b15f1fd
-
SHA1
7c89ec25ff92f9ce5919eaae654bdcfa342b99db
-
SHA256
d1ccb1bacee1f1f9662a7a17575937a05111fef02d0756cb29c538c8e2b45022
-
SHA512
7602cd9a3772d95ca86e3e3002d45d103d054c6d2936749ca1dbd6f456fc8df809300bee9e3e8b5911e2c6de249bd7a6751118705461ec3a9ec1f02798bb270d
-
SSDEEP
6144:WGpoY5A5QA2vVVnSNMJu+V1wv0ZlDeG4dCJP2+8HP778cpm4VHXT11d9z74Mm8NV:WGzEt2rKHcfe6JH05meXT1Lh7OeLpT
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.myhydropowered.com - Port:
587 - Username:
[email protected] - Password:
nW5AoStmqtxtXpA - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Loads dropped DLL 1 IoCs
pid Process 2296 rev_new order2024pdf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 45 drive.google.com 46 drive.google.com -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 61 api.ipify.org 62 api.ipify.org 63 ip-api.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rekinole.Pre rev_new order2024pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4636 rev_new order2024pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2296 rev_new order2024pdf.exe 4636 rev_new order2024pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2296 set thread context of 4636 2296 rev_new order2024pdf.exe 103 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4636 rev_new order2024pdf.exe 4636 rev_new order2024pdf.exe 4636 rev_new order2024pdf.exe 4636 rev_new order2024pdf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2296 rev_new order2024pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4636 rev_new order2024pdf.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2296 wrote to memory of 4636 2296 rev_new order2024pdf.exe 103 PID 2296 wrote to memory of 4636 2296 rev_new order2024pdf.exe 103 PID 2296 wrote to memory of 4636 2296 rev_new order2024pdf.exe 103 PID 2296 wrote to memory of 4636 2296 rev_new order2024pdf.exe 103 PID 2296 wrote to memory of 4636 2296 rev_new order2024pdf.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe"C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe"C:\Users\Admin\AppData\Local\Temp\rev_new order2024pdf.exe"2⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2628 --field-trial-handle=3192,i,2785050981002401924,4037047756083432660,262144 --variations-seed-version /prefetch:81⤵PID:744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD54add245d4ba34b04f213409bfe504c07
SHA1ef756d6581d70e87d58cc4982e3f4d18e0ea5b09
SHA2569111099efe9d5c9b391dc132b2faf0a3851a760d4106d5368e30ac744eb42706
SHA5121bd260cabe5ea3cefbbc675162f30092ab157893510f45a1b571489e03ebb2903c55f64f89812754d3fe03c8f10012b8078d1261a7e73ac1f87c82f714bce03d