Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
DHL Delivery Invoice.exe
Resource
win7-20240221-en
General
-
Target
DHL Delivery Invoice.exe
-
Size
656KB
-
MD5
9a05d55ccc3067e67255765a19eb1588
-
SHA1
a58a46f3eab7de03d61c2dcee4a166bb18d57d1e
-
SHA256
d094541214cfd198a1fdc69f068681427c9143ce04a25aeb2a64a807195bcb4a
-
SHA512
670f450283e15dbfa19950a6aa782e761cbd968629e22c5c88a90ec2625f3e51289c521cc75489fac4f47351d261a01c9f80f4b9bb4b67850254bcfea81b5a1a
-
SSDEEP
12288:I9zi8LkpEaHNnwCzGkzV2oRO7bPIVsFdsq7gUn/5Cnc+NZu1SOKjjE/zMEOp:I92jEewC6r7bPaYl7Fn/jOrOK8bMEO
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
ifeanyi@12 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2984 powershell.exe 2640 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DHL Delivery Invoice.exedescription pid process target process PID 2988 set thread context of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
DHL Delivery Invoice.exeDHL Delivery Invoice.exepowershell.exepowershell.exepid process 2988 DHL Delivery Invoice.exe 2988 DHL Delivery Invoice.exe 2988 DHL Delivery Invoice.exe 2988 DHL Delivery Invoice.exe 2700 DHL Delivery Invoice.exe 2700 DHL Delivery Invoice.exe 2640 powershell.exe 2984 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
DHL Delivery Invoice.exeDHL Delivery Invoice.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2988 DHL Delivery Invoice.exe Token: SeDebugPrivilege 2700 DHL Delivery Invoice.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2640 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
DHL Delivery Invoice.exepid process 2700 DHL Delivery Invoice.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
DHL Delivery Invoice.exedescription pid process target process PID 2988 wrote to memory of 2984 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2984 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2984 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2984 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2640 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2640 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2640 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2640 2988 DHL Delivery Invoice.exe powershell.exe PID 2988 wrote to memory of 2796 2988 DHL Delivery Invoice.exe schtasks.exe PID 2988 wrote to memory of 2796 2988 DHL Delivery Invoice.exe schtasks.exe PID 2988 wrote to memory of 2796 2988 DHL Delivery Invoice.exe schtasks.exe PID 2988 wrote to memory of 2796 2988 DHL Delivery Invoice.exe schtasks.exe PID 2988 wrote to memory of 2472 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2472 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2472 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2472 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe PID 2988 wrote to memory of 2700 2988 DHL Delivery Invoice.exe DHL Delivery Invoice.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\RFrrpJl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RFrrpJl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp45D6.tmp"2⤵
- Creates scheduled task(s)
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"2⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"C:\Users\Admin\AppData\Local\Temp\DHL Delivery Invoice.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54814b10f7b9acb6abb198d01ede14718
SHA1ef590b5f7e9f4e1de4161e0d5bd1952929a198af
SHA256742fd05bb37ec6c640eccefdaa5576980f8252f75d01c56c977cb817a8e275c3
SHA5128ef301c430ed3c1a89fa9b8700c0dfcf03438775526c42a4a4bd388a06ed7e0f4b79f461d4ee3e693c84ccb0f3d9d4e27e24fcc52c4220624d5e05c3fb12c995
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5284ea95821ec08b329ba0359b7275812
SHA18c14689cd2855aa7a40c7964e1640a8435f9d6f1
SHA256b1aac5c92af0490f3baa7e53c49aa2a32a17891283474ab13d5694f967b8f310
SHA5120995c49c338cdef74cf14ee0927b1ff064ea73b94ba2ae3ed3fa8feb197bc4a23ac7e03427ec8916c5f59e6b51adf81b1a85b3d86d058d9b56821b1a1e8acdf7