Analysis
-
max time kernel
122s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
30-03-2024 01:05
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v2004-20240226-en
General
-
Target
PURCHASE ORDER.exe
-
Size
670KB
-
MD5
0e2cf387d4c9e428e4fe7426267dcf78
-
SHA1
6b9d263c151a33ed3f4a190ff946d52220e0f4f9
-
SHA256
4f632d095e16ece2c5dfae8a7960012ae4c94d5d8420c1a4370161d7eb2cf16d
-
SHA512
fb006aefc41f72b39ab9c6d45056af8bc8c52ade79aa4991977535632075ee555d74495eae741c9a19c28461d3da853d8d07d8ceaba8364c0e2fdd46d614ccc4
-
SSDEEP
12288:B7NtLK1lOYgzMEcgyAZx94KgLGeq/tsWzsCywR8Sk4:hicNQ+xCKaGhloPT
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.shivomrealty.com - Port:
587 - Username:
[email protected] - Password:
Priya1982# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
PURCHASE ORDER.exedescription pid process target process PID 2928 set thread context of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
PURCHASE ORDER.exePURCHASE ORDER.exepowershell.exepowershell.exepid process 2928 PURCHASE ORDER.exe 2928 PURCHASE ORDER.exe 2928 PURCHASE ORDER.exe 2928 PURCHASE ORDER.exe 2928 PURCHASE ORDER.exe 2928 PURCHASE ORDER.exe 2928 PURCHASE ORDER.exe 544 PURCHASE ORDER.exe 544 PURCHASE ORDER.exe 2672 powershell.exe 2712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
PURCHASE ORDER.exePURCHASE ORDER.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2928 PURCHASE ORDER.exe Token: SeDebugPrivilege 544 PURCHASE ORDER.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2712 powershell.exe -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
PURCHASE ORDER.exedescription pid process target process PID 2928 wrote to memory of 2672 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2672 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2672 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2672 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2712 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2712 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2712 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2712 2928 PURCHASE ORDER.exe powershell.exe PID 2928 wrote to memory of 2588 2928 PURCHASE ORDER.exe schtasks.exe PID 2928 wrote to memory of 2588 2928 PURCHASE ORDER.exe schtasks.exe PID 2928 wrote to memory of 2588 2928 PURCHASE ORDER.exe schtasks.exe PID 2928 wrote to memory of 2588 2928 PURCHASE ORDER.exe schtasks.exe PID 2928 wrote to memory of 584 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 584 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 584 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 584 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 268 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 268 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 268 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 268 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe PID 2928 wrote to memory of 544 2928 PURCHASE ORDER.exe PURCHASE ORDER.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SOhaQHvG.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SOhaQHvG" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCEE3.tmp"2⤵
- Creates scheduled task(s)
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de9b0da52df7948717c21944388c283a
SHA1376a1e01fc73702fc7101fd5f2abd4fbd4404a16
SHA256edac50c86f750749672957de48de936ab2a972bd8303c1bf606341eeece83e34
SHA512215d49a4bd26b9a3e39961716ff64932683a88040dd85c2c413cd6c8f1e276f254b49b8009aab8a52719d269b65f1a622e49edd09ac2e442f8551f57a296a3c7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\960I7EA9C57SLM6JS4KX.temp
Filesize7KB
MD5b6b5b3f5a51cc8f55573fa08ec49ce4e
SHA1a1d7324afd54334968bf7c6b9108e050ccc56bc4
SHA25649d9ae1ab8cc958770ded0a04ca75f997799bbfb922c792bbc47362e66939dce
SHA5125379a892cdaf3c778c5c24c5874103a72a24ede2fb9d17425a307b879d83dfae8b5d11f199ee03f1afc447a94249c2bb50a17f930f12fc4b26817c24eb89d4c8