Malware Analysis Report

2024-11-15 06:26

Sample ID 240618-ql86razamp
Target ORDER #524562637.exe
SHA256 19b604df73a21665949858204d634fc31077cc0b1c0c02f53712b2cf3b5e8bc0
Tags
agenttesla execution keylogger spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

19b604df73a21665949858204d634fc31077cc0b1c0c02f53712b2cf3b5e8bc0

Threat Level: Known bad

The file ORDER #524562637.exe was found to be: Known bad.

Malicious Activity Summary

agenttesla execution keylogger spyware stealer trojan

AgentTesla

Command and Scripting Interpreter: PowerShell

Checks computer location settings

Looks up external IP address via web service

Suspicious use of SetThreadContext

Unsigned PE

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-18 13:22

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-18 13:22

Reported

2024-06-18 13:24

Platform

win7-20240508-en

Max time kernel

121s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2972 set thread context of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2972 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2972 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2972 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2972 wrote to memory of 2680 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 2972 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 2972 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 2972 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 2972 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 2972 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2860 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 2972 wrote to memory of 2572 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe

"C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\VktyLZ.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VktyLZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5CEF.tmp"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 api.ipify.org udp

Files

memory/2972-0-0x0000000074B3E000-0x0000000074B3F000-memory.dmp

memory/2972-1-0x00000000011A0000-0x0000000001266000-memory.dmp

memory/2972-2-0x0000000074B30000-0x000000007521E000-memory.dmp

memory/2972-3-0x0000000000A30000-0x0000000000A4A000-memory.dmp

memory/2972-4-0x0000000000360000-0x0000000000370000-memory.dmp

memory/2972-5-0x0000000005BA0000-0x0000000005C24000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5CEF.tmp

MD5 167c88339c4d5c692e3c6c51dc8d70b5
SHA1 6fb375f9355654e4d3a2e940db2c69aa492f1eee
SHA256 028c59e747aa434017affa02979e3d79b15b4da4081553e43474a975df5ba6d8
SHA512 7ded6aad21286bb74dc457fe91790459fb652257e36d96760ef1a671eee3ac21fcd2c99e5080fc89b208b40d288483085def0e348bcc76b1f1828142ec887256

memory/2572-22-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2572-25-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2572-23-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2572-21-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

memory/2572-19-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2572-17-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2572-15-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2572-13-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2972-26-0x0000000074B30000-0x000000007521E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-18 13:22

Reported

2024-06-18 13:24

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe"

Signatures

AgentTesla

keylogger trojan stealer spyware agenttesla

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 4604 set thread context of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

Enumerates physical storage devices

Scheduled Task/Job: Scheduled Task

persistence execution
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\schtasks.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4604 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4604 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4604 wrote to memory of 2228 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
PID 4604 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 4604 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 4604 wrote to memory of 3528 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\SysWOW64\schtasks.exe
PID 4604 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 5004 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
PID 4604 wrote to memory of 3660 N/A C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

Processes

C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe

"C:\Users\Admin\AppData\Local\Temp\ORDER #524562637.exe"

C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\VktyLZ.exe"

C:\Windows\SysWOW64\schtasks.exe

"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\VktyLZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7C44.tmp"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"

C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe

"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 136.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 api.ipify.org udp
US 172.67.74.152:443 api.ipify.org tcp
US 8.8.8.8:53 152.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 udp

Files

memory/4604-0-0x000000007515E000-0x000000007515F000-memory.dmp

memory/4604-1-0x0000000000580000-0x0000000000646000-memory.dmp

memory/4604-2-0x0000000005430000-0x00000000059D4000-memory.dmp

memory/4604-3-0x0000000004F20000-0x0000000004FB2000-memory.dmp

memory/4604-4-0x0000000004ED0000-0x0000000004EDA000-memory.dmp

memory/4604-5-0x0000000075150000-0x0000000075900000-memory.dmp

memory/4604-6-0x0000000005410000-0x000000000542A000-memory.dmp

memory/4604-7-0x0000000005090000-0x00000000050A0000-memory.dmp

memory/4604-8-0x00000000078B0000-0x0000000007934000-memory.dmp

memory/4604-9-0x000000000A000000-0x000000000A09C000-memory.dmp

memory/2228-14-0x0000000002600000-0x0000000002636000-memory.dmp

memory/2228-16-0x00000000052A0000-0x00000000058C8000-memory.dmp

memory/2228-15-0x0000000075150000-0x0000000075900000-memory.dmp

memory/2228-18-0x0000000075150000-0x0000000075900000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp7C44.tmp

MD5 9e845a80bba63408d9d1081b90720705
SHA1 4aa960bd4419081786ca9fb0b1cf16809d387c58
SHA256 cd17172925a46f3c852272122de71d1dd0218ad8de8cd0f7f6e6fa290fa0379f
SHA512 b38853555fbc5830687e36e427dba972b5bc85b68ee6e37b5c251cffb935d7586b613498d4930be543b309a2745893391eb4e7861b39ff1987c9527f3864f451

memory/2228-19-0x0000000075150000-0x0000000075900000-memory.dmp

memory/3660-20-0x0000000000400000-0x0000000000442000-memory.dmp

memory/2228-21-0x0000000005160000-0x0000000005182000-memory.dmp

memory/3660-24-0x0000000075150000-0x0000000075900000-memory.dmp

memory/2228-25-0x0000000005200000-0x0000000005266000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_okoqynot.gmu.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2228-31-0x0000000005940000-0x00000000059A6000-memory.dmp

memory/4604-23-0x0000000075150000-0x0000000075900000-memory.dmp

memory/2228-36-0x0000000005B00000-0x0000000005E54000-memory.dmp

memory/2228-37-0x0000000005F20000-0x0000000005F3E000-memory.dmp

memory/2228-38-0x0000000005FD0000-0x000000000601C000-memory.dmp

memory/2228-40-0x0000000071540000-0x000000007158C000-memory.dmp

memory/2228-39-0x00000000064F0000-0x0000000006522000-memory.dmp

memory/2228-50-0x0000000006530000-0x000000000654E000-memory.dmp

memory/2228-51-0x0000000006FA0000-0x0000000007043000-memory.dmp

memory/2228-52-0x00000000078D0000-0x0000000007F4A000-memory.dmp

memory/2228-53-0x0000000007250000-0x000000000726A000-memory.dmp

memory/2228-54-0x00000000072C0000-0x00000000072CA000-memory.dmp

memory/2228-55-0x00000000074D0000-0x0000000007566000-memory.dmp

memory/2228-56-0x0000000007450000-0x0000000007461000-memory.dmp

memory/3660-57-0x0000000006C40000-0x0000000006C90000-memory.dmp

memory/2228-58-0x0000000007480000-0x000000000748E000-memory.dmp

memory/2228-59-0x0000000007490000-0x00000000074A4000-memory.dmp

memory/2228-60-0x0000000007590000-0x00000000075AA000-memory.dmp

memory/2228-61-0x0000000007570000-0x0000000007578000-memory.dmp

memory/2228-64-0x0000000075150000-0x0000000075900000-memory.dmp

memory/3660-65-0x0000000075150000-0x0000000075900000-memory.dmp