Analysis
-
max time kernel
92s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
Product Order Inquiry 37674309.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Product Order Inquiry 37674309.exe
Resource
win10v2004-20240426-en
General
-
Target
Product Order Inquiry 37674309.exe
-
Size
602KB
-
MD5
0e67cad7c6a52f0ce71753e2d878f009
-
SHA1
cb0c5bf0531044751e3a8be21ac76795e03c7251
-
SHA256
b23c16643bf0ee432042493f8d9156021f0bab84b18517ba6cf0a75b721b6925
-
SHA512
18b6adff896d68a0a4e2c2ed300ba58691e77be89e83f8fdb34b20fcd30fabd22b7fb1d1a90568ca65916f9ed6ab022b04d0520be1311e62391139bc4cc9afa9
-
SSDEEP
12288:fbFktg5m832TKYKr+zADCjZbQgCELjnbXX9dysE6tb2EW2IQ5mSAa6:fbFkNT5Kazw4JQDELjnbXX9Uh6hWP4md
Malware Config
Extracted
Protocol: smtp- Host:
mail.nsatech.co - Port:
587 - Username:
[email protected] - Password:
Hn064008007320212021
Extracted
agenttesla
Protocol: smtp- Host:
mail.nsatech.co - Port:
587 - Username:
[email protected] - Password:
Hn064008007320212021 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3324 set thread context of 2288 3324 Product Order Inquiry 37674309.exe 84 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2288 CasPol.exe 2288 CasPol.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2288 CasPol.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84 PID 3324 wrote to memory of 2288 3324 Product Order Inquiry 37674309.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\Product Order Inquiry 37674309.exe"C:\Users\Admin\AppData\Local\Temp\Product Order Inquiry 37674309.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-