Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 02:36
Static task
static1
Behavioral task
behavioral1
Sample
new order.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
new order.exe
Resource
win10v2004-20240226-en
General
-
Target
new order.exe
-
Size
668KB
-
MD5
cf021b7974c2665564085795f85a0ede
-
SHA1
d2084747f540500ab61974ac288ab05f9d91334a
-
SHA256
044ce9e194f5194b8d0e12e8e05fc3a3ff3782e60d5b3838351e80ac43663e4d
-
SHA512
cf5d6acecf132c3a01ec82b3f4e8e2c66c854611b6d71b53d2b148fa492c47f800eb443a9e46828fb3cc3b408da571ee86ecc31facb67f8d7bfbd9560b7780aa
-
SSDEEP
12288:iGCCi8LkpEatgdWrtzQswH4X1nqcSg+jEKAEGaCtXm3dCcQBoTY2ZkR:i9ZjE0GqNA4X1ijEKAER023d2BWE
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2600 powershell.exe 2752 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
new order.exedescription pid process target process PID 348 set thread context of 2468 348 new order.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
new order.exeRegSvcs.exepowershell.exepowershell.exepid process 348 new order.exe 348 new order.exe 348 new order.exe 348 new order.exe 348 new order.exe 348 new order.exe 348 new order.exe 2468 RegSvcs.exe 2468 RegSvcs.exe 2600 powershell.exe 2752 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
new order.exeRegSvcs.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 348 new order.exe Token: SeDebugPrivilege 2468 RegSvcs.exe Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 2752 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
new order.exedescription pid process target process PID 348 wrote to memory of 2752 348 new order.exe powershell.exe PID 348 wrote to memory of 2752 348 new order.exe powershell.exe PID 348 wrote to memory of 2752 348 new order.exe powershell.exe PID 348 wrote to memory of 2752 348 new order.exe powershell.exe PID 348 wrote to memory of 2600 348 new order.exe powershell.exe PID 348 wrote to memory of 2600 348 new order.exe powershell.exe PID 348 wrote to memory of 2600 348 new order.exe powershell.exe PID 348 wrote to memory of 2600 348 new order.exe powershell.exe PID 348 wrote to memory of 2628 348 new order.exe schtasks.exe PID 348 wrote to memory of 2628 348 new order.exe schtasks.exe PID 348 wrote to memory of 2628 348 new order.exe schtasks.exe PID 348 wrote to memory of 2628 348 new order.exe schtasks.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe PID 348 wrote to memory of 2468 348 new order.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\new order.exe"C:\Users\Admin\AppData\Local\Temp\new order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\new order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HKBGOfx.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HKBGOfx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp84F8.tmp"2⤵
- Creates scheduled task(s)
PID:2628
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f380bc81cae675ed17fd6cea0add8730
SHA1d723d3aa72cc934c5db74225ac39daf6290cee00
SHA256c5af70785bacea14a0619877e91f7d066d828e94e30acbb4360c80af74be38f5
SHA5124c9b40e4a293aa8ebb47f8da4e657df91a2d66ba0311b0a07dff9f15b3fe11e4c9c39994bc4f3127f5cb43d7c6885df32c4596d637425a0b929d43ace992dea2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LAA0IZ3I3MDLRRI9FQ4L.temp
Filesize7KB
MD53069c6d0ebf23b9bc81c50237b827169
SHA11aadff0157a3f71c90d7b285b6ddb47d03655dec
SHA2561305ee4c09b3844b6c901c7cdddfe5748b67366027059c77473460a602369704
SHA512930cc89845ea91cc5d35734330c30371583eac615fb3d58467521c9ef466ebbdd464413c8fad6eb608c2a581e46863e6884483f997f5553f16dd203f1e1b3ad3