Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24/05/2024, 12:54
Static task
static1
Behavioral task
behavioral1
Sample
new order.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
new order.exe
Resource
win10v2004-20240426-en
General
-
Target
new order.exe
-
Size
668KB
-
MD5
cf021b7974c2665564085795f85a0ede
-
SHA1
d2084747f540500ab61974ac288ab05f9d91334a
-
SHA256
044ce9e194f5194b8d0e12e8e05fc3a3ff3782e60d5b3838351e80ac43663e4d
-
SHA512
cf5d6acecf132c3a01ec82b3f4e8e2c66c854611b6d71b53d2b148fa492c47f800eb443a9e46828fb3cc3b408da571ee86ecc31facb67f8d7bfbd9560b7780aa
-
SSDEEP
12288:iGCCi8LkpEatgdWrtzQswH4X1nqcSg+jEKAEGaCtXm3dCcQBoTY2ZkR:i9ZjE0GqNA4X1ijEKAER023d2BWE
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2692 powershell.exe 2640 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1644 set thread context of 2200 1644 new order.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2612 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1644 new order.exe 1644 new order.exe 1644 new order.exe 1644 new order.exe 1644 new order.exe 1644 new order.exe 1644 new order.exe 2640 powershell.exe 2692 powershell.exe 2200 RegSvcs.exe 2200 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1644 new order.exe Token: SeDebugPrivilege 2640 powershell.exe Token: SeDebugPrivilege 2692 powershell.exe Token: SeDebugPrivilege 2200 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2692 1644 new order.exe 28 PID 1644 wrote to memory of 2692 1644 new order.exe 28 PID 1644 wrote to memory of 2692 1644 new order.exe 28 PID 1644 wrote to memory of 2692 1644 new order.exe 28 PID 1644 wrote to memory of 2640 1644 new order.exe 30 PID 1644 wrote to memory of 2640 1644 new order.exe 30 PID 1644 wrote to memory of 2640 1644 new order.exe 30 PID 1644 wrote to memory of 2640 1644 new order.exe 30 PID 1644 wrote to memory of 2612 1644 new order.exe 31 PID 1644 wrote to memory of 2612 1644 new order.exe 31 PID 1644 wrote to memory of 2612 1644 new order.exe 31 PID 1644 wrote to memory of 2612 1644 new order.exe 31 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34 PID 1644 wrote to memory of 2200 1644 new order.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\new order.exe"C:\Users\Admin\AppData\Local\Temp\new order.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\new order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HKBGOfx.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2640
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HKBGOfx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp85E2.tmp"2⤵
- Creates scheduled task(s)
PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f380bc81cae675ed17fd6cea0add8730
SHA1d723d3aa72cc934c5db74225ac39daf6290cee00
SHA256c5af70785bacea14a0619877e91f7d066d828e94e30acbb4360c80af74be38f5
SHA5124c9b40e4a293aa8ebb47f8da4e657df91a2d66ba0311b0a07dff9f15b3fe11e4c9c39994bc4f3127f5cb43d7c6885df32c4596d637425a0b929d43ace992dea2
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\T0VZHVSJFRTZ7R6VVOML.temp
Filesize7KB
MD5d5e4efc27a2943408f9c1ad53287ecce
SHA1ebea97362a40a426617caac61e928f84e83b26a8
SHA256e196a510bbb73b6b2104b3b9bb81b56419c2b4d5cd993c08c43240be375fb861
SHA51280a45dbc4b3e70b5c9586ea40f2ce7fd0e01029c364e9e4d558cf096beba6910d4c366f4015a2074f1c3a3498b2b171cf45d9715f3b9bb2742f50dcf90cb9479