Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 15:35
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
New order.exe
Resource
win10v2004-20240426-en
General
-
Target
New order.exe
-
Size
853KB
-
MD5
a918e922397d50c75a2ae930e6e3e733
-
SHA1
f57c53de5e2b7156b7de7eb6fadac808db2a648f
-
SHA256
c3fb8862aa52c578aca75ee923448a3013ff97e2ebe3b0dad8d6d708e78262bf
-
SHA512
b1d07be42ee7d6e412264828c99e7c25d4e027203272ae66ebb3fb9551fe777bccb0e0ddce8eb0b343e468a36b94b401af6e0be4e94601601471941b2a895683
-
SSDEEP
24576:Zw4bjw4blsqzA4+wKZjXU/GaHqK2RpnEU17B:Zw4bjw4blsqzgtU/dHqKEnEwB
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1328 powershell.exe 2724 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2252 set thread context of 1212 2252 New order.exe 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2252 New order.exe 2252 New order.exe 2252 New order.exe 2252 New order.exe 2252 New order.exe 2252 New order.exe 2252 New order.exe 2252 New order.exe 2252 New order.exe 1212 RegSvcs.exe 1212 RegSvcs.exe 1328 powershell.exe 2724 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2252 New order.exe Token: SeDebugPrivilege 1212 RegSvcs.exe Token: SeDebugPrivilege 1328 powershell.exe Token: SeDebugPrivilege 2724 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2252 wrote to memory of 1328 2252 New order.exe 28 PID 2252 wrote to memory of 1328 2252 New order.exe 28 PID 2252 wrote to memory of 1328 2252 New order.exe 28 PID 2252 wrote to memory of 1328 2252 New order.exe 28 PID 2252 wrote to memory of 2724 2252 New order.exe 30 PID 2252 wrote to memory of 2724 2252 New order.exe 30 PID 2252 wrote to memory of 2724 2252 New order.exe 30 PID 2252 wrote to memory of 2724 2252 New order.exe 30 PID 2252 wrote to memory of 2776 2252 New order.exe 32 PID 2252 wrote to memory of 2776 2252 New order.exe 32 PID 2252 wrote to memory of 2776 2252 New order.exe 32 PID 2252 wrote to memory of 2776 2252 New order.exe 32 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1180 2252 New order.exe 34 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35 PID 2252 wrote to memory of 1212 2252 New order.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\New order.exe"C:\Users\Admin\AppData\Local\Temp\New order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GDBGcnlB.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GDBGcnlB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7E83.tmp"2⤵
- Creates scheduled task(s)
PID:2776
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5225fbfab723dcc73de9289921d586340
SHA136699453943e9d222f6cefd31f18ead3158eaf98
SHA2560634e2b07e7551001f84478d59921db248418616702ea0a7a56d7ff774373b81
SHA5122b77c79835016b53afb7d9e69379f66bcad326223a0514ef091628228c5d89633e4139fcdf5235590c1e021e44d47ba958645de88610ec214b8e79f28cd75905
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZVTYG83AFJRS2HGBGJM5.temp
Filesize7KB
MD54cd8af60056724adeacaa576aa1bcdb5
SHA1d471554acaf05788e0084f2ed225642650ea2204
SHA256e8e772c13c1069ae4c1c2d0296b319108bc02455150febf3aaa130e94a3f04a2
SHA512ccd9ccde6c273f3dd21a317614e83ab2cf4ee70c0f3600375c0adbd6a5f9834cefbe0769b1195eec7ae31c34ae565b3634fb3cc87139dedf4ddf0cdfaad3451e