Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27-03-2024 09:52
Static task
static1
Behavioral task
behavioral1
Sample
new invoice.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
new invoice.exe
Resource
win10v2004-20240226-en
General
-
Target
new invoice.exe
-
Size
743KB
-
MD5
f52a3af798452ba8064246c1c05fca48
-
SHA1
66327142382aac09b7b954a860a778e8921f3bfc
-
SHA256
1ed60fc77b07f949a7cc3ced2dd0e0de84ce806a5ebb71d7fc51f31323f2b928
-
SHA512
8520039308ec25ad01a08395bf875757d060ed4702561c001cd57430a660924afaedee8ac441148fce32562bd68fbecdd9675066842e2091a24800ccaee2fa12
-
SSDEEP
12288:yBCAygw0Jxx2Nhy5BZvSkFleJSQEiqC1cS7Zx2DRZL6mJ5DTCa0mY:yRj3xky5vFIVqC19ZxsCmXCsY
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
sg3plcpnl0020.prod.sin3.secureserver.net - Port:
587 - Username:
[email protected] - Password:
gaging@2022 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
new invoice.exedescription pid process target process PID 1976 set thread context of 2928 1976 new invoice.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
new invoice.exepowershell.exepowershell.exeRegSvcs.exepid process 1976 new invoice.exe 1976 new invoice.exe 1976 new invoice.exe 1976 new invoice.exe 2284 powershell.exe 2860 powershell.exe 2928 RegSvcs.exe 2928 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
new invoice.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1976 new invoice.exe Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2928 RegSvcs.exe -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
new invoice.exedescription pid process target process PID 1976 wrote to memory of 2284 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2284 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2284 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2284 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2860 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2860 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2860 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2860 1976 new invoice.exe powershell.exe PID 1976 wrote to memory of 2548 1976 new invoice.exe schtasks.exe PID 1976 wrote to memory of 2548 1976 new invoice.exe schtasks.exe PID 1976 wrote to memory of 2548 1976 new invoice.exe schtasks.exe PID 1976 wrote to memory of 2548 1976 new invoice.exe schtasks.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2492 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe PID 1976 wrote to memory of 2928 1976 new invoice.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\new invoice.exe"C:\Users\Admin\AppData\Local\Temp\new invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\new invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LuPGIUTRrkvtes.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LuPGIUTRrkvtes" /XML "C:\Users\Admin\AppData\Local\Temp\tmp84C9.tmp"2⤵
- Creates scheduled task(s)
PID:2548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2492
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b8ad3bb209acc4f5fe30006d71440655
SHA1d415b7f75b53ec0cc4247f4c9c91cc0221ade31e
SHA25697e027063a2d3b4742ea671960b07338b6d3b152c889eebe319c60896b7dbe62
SHA512f0235557b2e50e070857bb42453b10c55b8cf868758e370182d0ec7376165ce55d46aa688f46ae53cbce3e630b0f4b6c3933c46b4270971a329e807e047bb4ee
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5a7e69ed5b369f2e86d4d48d841f1ac0c
SHA1402f9420069934a5b41d187871e6cf32c0d80175
SHA256acaf1ddf5f516b13a55d33f733cc8c4c4f588ed8659cdcc16e8f8fb31b293e6d
SHA5121ec5cf011484f4d2665f1787b5058cecd12804a4fc101748d73634b5b4277f0092bc64639a9a9ec9b7e215d9052bcc0a4a39ce8dfd90aa88326fe9bacb889f3c