Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
22-04-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
Unpaid Orders.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
Unpaid Orders.exe
Resource
win10v2004-20240412-en
General
-
Target
Unpaid Orders.exe
-
Size
714KB
-
MD5
a8840ab3795a9da734322e577d8562ea
-
SHA1
479416944428b322eb81421535f457803088404c
-
SHA256
dd64934df95a8678e303aaef7b1b8b58caa68a039e3f50788c7c88f408e93432
-
SHA512
03d861f734650e0a8c5c2274008cdd94b13492e56f069ade03eda95b8f0615dce8fd5d70180a0f91cc30e36a52b88df08c26a9a9f8d082213bce95c94023331a
-
SSDEEP
12288:v6UZhF9WMHm+v6yNjd7ooBjGBXkn0LjphnNfWeqUF16IreRZs:yUb2MG+ieFoY651jphnlFqs/
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.rwa-at.com - Port:
587 - Username:
[email protected] - Password:
CASH@COM12345 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1260 set thread context of 2396 1260 Unpaid Orders.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1260 Unpaid Orders.exe 1260 Unpaid Orders.exe 1260 Unpaid Orders.exe 1260 Unpaid Orders.exe 2608 powershell.exe 2860 powershell.exe 2396 Unpaid Orders.exe 2396 Unpaid Orders.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1260 Unpaid Orders.exe Token: SeDebugPrivilege 2608 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2396 Unpaid Orders.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2608 1260 Unpaid Orders.exe 28 PID 1260 wrote to memory of 2608 1260 Unpaid Orders.exe 28 PID 1260 wrote to memory of 2608 1260 Unpaid Orders.exe 28 PID 1260 wrote to memory of 2608 1260 Unpaid Orders.exe 28 PID 1260 wrote to memory of 2860 1260 Unpaid Orders.exe 30 PID 1260 wrote to memory of 2860 1260 Unpaid Orders.exe 30 PID 1260 wrote to memory of 2860 1260 Unpaid Orders.exe 30 PID 1260 wrote to memory of 2860 1260 Unpaid Orders.exe 30 PID 1260 wrote to memory of 2684 1260 Unpaid Orders.exe 32 PID 1260 wrote to memory of 2684 1260 Unpaid Orders.exe 32 PID 1260 wrote to memory of 2684 1260 Unpaid Orders.exe 32 PID 1260 wrote to memory of 2684 1260 Unpaid Orders.exe 32 PID 1260 wrote to memory of 2400 1260 Unpaid Orders.exe 34 PID 1260 wrote to memory of 2400 1260 Unpaid Orders.exe 34 PID 1260 wrote to memory of 2400 1260 Unpaid Orders.exe 34 PID 1260 wrote to memory of 2400 1260 Unpaid Orders.exe 34 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35 PID 1260 wrote to memory of 2396 1260 Unpaid Orders.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KeECWTaVQBbzE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KeECWTaVQBbzE" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4125.tmp"2⤵
- Creates scheduled task(s)
PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"2⤵PID:2400
-
-
C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"C:\Users\Admin\AppData\Local\Temp\Unpaid Orders.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5cb439667d94229b652d2add91783ddd7
SHA18b0a2cadaed164c1c21af20924dd427b546c66ad
SHA2560d1029f831e072cc28ab06880ecf519250d2d00c8ebe869429ca230c7bef90b6
SHA512f61360cfdcfc537377062ce4375dcc4490ca6598af25c53e88a10b16c3bdc5ce6ec5cc2674e2ac96dc72fc1a3f360f48b319c1b0a8723c8f639b4ab489514f52
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d539a3a20b804758f0c7cb70b5097577
SHA1eb95065a3735ea97b491ca1b55750f5d0887988b
SHA256f6afa6355ed338fdc411f1ebb17f2eb5c328dd5b5baf839584e02df6aa9c1b13
SHA5127408a314e5ca55701c6d17edeb690d003bf743fe30b770aa9bf551ca77c3a9c99ac21aab5593be863444cdf22c033f7cd2dda788e643900b08c388ae73adcdb7