Analysis
-
max time kernel
22s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
06/06/2024, 02:25
Static task
static1
Behavioral task
behavioral1
Sample
INQUIRY FOR TI ORDER IN HAND.exe
Resource
win7-20240508-en
General
-
Target
INQUIRY FOR TI ORDER IN HAND.exe
-
Size
914KB
-
MD5
be162a79f5b63797e12633d22e2be636
-
SHA1
45013c639574e42626d90695397556af763d6320
-
SHA256
cd99bbc0a0e633dc0aeefd6d10248559f9fd295b77b05989834f75364596c968
-
SHA512
89c777b2f267d0cb2c242e5e4a32099a6fbb0e5ac7437a2f918ce4a2ab74b7196012cb6e31039087d80498d425b802ff1e9c22953c53362d3894bccea891db58
-
SSDEEP
24576:q6OZli7Eeyq5BpQj+RQIOlYjJfph1i1q:q6XEe7kj+RQIO4Lh1P
Malware Config
Extracted
Protocol: smtp- Host:
shared167.accountservergroup.com - Port:
587 - Username:
[email protected] - Password:
Stanley @123#
Extracted
agenttesla
Protocol: smtp- Host:
shared167.accountservergroup.com - Port:
587 - Username:
[email protected] - Password:
Stanley @123# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2852 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1544 INQUIRY FOR TI ORDER IN HAND.exe 1544 INQUIRY FOR TI ORDER IN HAND.exe 1544 INQUIRY FOR TI ORDER IN HAND.exe 1544 INQUIRY FOR TI ORDER IN HAND.exe 1544 INQUIRY FOR TI ORDER IN HAND.exe 1544 INQUIRY FOR TI ORDER IN HAND.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1544 INQUIRY FOR TI ORDER IN HAND.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2852 1544 INQUIRY FOR TI ORDER IN HAND.exe 28 PID 1544 wrote to memory of 2852 1544 INQUIRY FOR TI ORDER IN HAND.exe 28 PID 1544 wrote to memory of 2852 1544 INQUIRY FOR TI ORDER IN HAND.exe 28 PID 1544 wrote to memory of 2852 1544 INQUIRY FOR TI ORDER IN HAND.exe 28 PID 1544 wrote to memory of 2616 1544 INQUIRY FOR TI ORDER IN HAND.exe 30 PID 1544 wrote to memory of 2616 1544 INQUIRY FOR TI ORDER IN HAND.exe 30 PID 1544 wrote to memory of 2616 1544 INQUIRY FOR TI ORDER IN HAND.exe 30 PID 1544 wrote to memory of 2616 1544 INQUIRY FOR TI ORDER IN HAND.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aKQnLoATXbRbj.exe"2⤵
- Command and Scripting Interpreter: PowerShell
PID:2852
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aKQnLoATXbRbj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8C67.tmp"2⤵
- Creates scheduled task(s)
PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"2⤵PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"2⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"C:\Users\Admin\AppData\Local\Temp\INQUIRY FOR TI ORDER IN HAND.exe"2⤵PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e1c12b418373b6ac60d28f690719afb4
SHA187d03d09faf6e3ec44edfdcd0fce1ada3e302195
SHA256d0304dd1d6d471c10f4ebbf3205ec11558541b1e6f3868f62533e660b1a31aa4
SHA512ff05afe1d9293139c81612c9cd9b05544ce261b36e3fcd65064ff89f99962f01641306b463d71a1e0880e34e8e5c74144316860f93c8488f31280dba9ea9906d