Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
Order Confirmations.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Order Confirmations.exe
Resource
win10v2004-20240226-en
General
-
Target
Order Confirmations.exe
-
Size
647KB
-
MD5
bfd203d85d6aeb94071e2897b02739aa
-
SHA1
6d811b83bdaa7c1b5e6dba4aab03c5bc35c4e57a
-
SHA256
5dda5302383b5a1677891f2bcb1da4876634f20c6cbecd2ec9a5e63a24fd5cdd
-
SHA512
ea29e969cd86b3f5e439d45b21414f3b27aaea9474a7aa7428c5352717e44318c10542079cb31261cafed4375e68d2ff267a803509c9a7e9a88935153e03c1ec
-
SSDEEP
12288:WUHs33hhOvt5Q6BSdN9/yaqv2omAvAbOET4h2cWjoIR:Pq/Ovtcur+ojv8OEirA
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.oceanskylogistics.in - Port:
587 - Username:
[email protected] - Password:
Shipping@224554 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2488 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 2652 powershell.exe 2520 powershell.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe 3044 Order Confirmations.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3044 Order Confirmations.exe Token: SeDebugPrivilege 2652 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2520 3044 Order Confirmations.exe 28 PID 3044 wrote to memory of 2520 3044 Order Confirmations.exe 28 PID 3044 wrote to memory of 2520 3044 Order Confirmations.exe 28 PID 3044 wrote to memory of 2520 3044 Order Confirmations.exe 28 PID 3044 wrote to memory of 2652 3044 Order Confirmations.exe 30 PID 3044 wrote to memory of 2652 3044 Order Confirmations.exe 30 PID 3044 wrote to memory of 2652 3044 Order Confirmations.exe 30 PID 3044 wrote to memory of 2652 3044 Order Confirmations.exe 30 PID 3044 wrote to memory of 2488 3044 Order Confirmations.exe 32 PID 3044 wrote to memory of 2488 3044 Order Confirmations.exe 32 PID 3044 wrote to memory of 2488 3044 Order Confirmations.exe 32 PID 3044 wrote to memory of 2488 3044 Order Confirmations.exe 32 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34 PID 3044 wrote to memory of 2300 3044 Order Confirmations.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Order Confirmations.exe"C:\Users\Admin\AppData\Local\Temp\Order Confirmations.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Order Confirmations.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FEjoSFtwHmn.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FEjoSFtwHmn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp87C6.tmp"2⤵
- Creates scheduled task(s)
PID:2488
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2300
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51730b18c75e2cfef8e49aa03d8505414
SHA1f793eb4e7ebc2d338395a2f76500298287e79ded
SHA256a71337d0a66619528bc91da91157d3ac9b3b0e3fb47ba44d444b65e3e674db66
SHA5129e07f29203f01264abf5d2af148324b47aa51aba1ecafc6c1838074573ae8759b4ff891b559db498ad207f83af919188c96725c6ee11f6523c6abf07c10754af
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD525c5a879f306ab24d7c42ef693edb993
SHA1d5ffee230a6795fd0eb445924a58138b1221c10c
SHA2565a124f860454a071ed9e4e59c6cab86ffd46f46cca31177e1ab7108bd9a5d7c1
SHA51212cfc21d9cebff8b1418de7ab6ecaadca26b784bcec8d70cb1ae6f73f75d03a8fdefcfabc7532fa7741e6a3d5c0c96a2b8af497763dc081f94d280e5b207b665