Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
New order.exe
Resource
win10v2004-20240802-en
General
-
Target
New order.exe
-
Size
1.5MB
-
MD5
180ad8fe3294d5cbf1508f3576c70f1c
-
SHA1
831c8ef7b3efedae003526a87139e806c713ed24
-
SHA256
13ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e
-
SHA512
d5a7ece40082978640d886b33729255c4b47a3bac6fac1973eb475599bf3c79795b2314dd4ae6c87685c56a0c9f9990a42a61d0ba9482be81489fae48900933c
-
SSDEEP
24576:qIgqdRkAM4OF+PMwrSVlbmfDYkhDvGtjXtGUAF9kJ7MqudghfEuCj0hThiHHxlhg:qIeMw6kbQlYSRUT7ofIlohsgm
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\EXE.lnk New order.exe -
Executes dropped EXE 1 IoCs
pid Process 2696 EXE.exe -
Loads dropped DLL 3 IoCs
pid Process 2892 cmd.exe 2696 EXE.exe 2696 EXE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2892 cmd.exe 2752 PING.EXE 2672 PING.EXE -
Runs ping.exe 1 TTPs 2 IoCs
pid Process 2672 PING.EXE 2752 PING.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2088 New order.exe 2088 New order.exe 2088 New order.exe 2088 New order.exe 2088 New order.exe 2088 New order.exe 2696 EXE.exe 2696 EXE.exe 2696 EXE.exe 2696 EXE.exe 2696 EXE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2088 New order.exe Token: SeDebugPrivilege 2696 EXE.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2088 wrote to memory of 2892 2088 New order.exe 31 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2752 2892 cmd.exe 33 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2672 2892 cmd.exe 34 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2892 wrote to memory of 2696 2892 cmd.exe 35 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 768 2696 EXE.exe 36 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37 PID 2696 wrote to memory of 984 2696 EXE.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\New order.exe"C:\Users\Admin\AppData\Local\Temp\New order.exe"1⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 40 > nul && copy "C:\Users\Admin\AppData\Local\Temp\New order.exe" "C:\Users\Admin\AppData\Roaming\EXE.exe" && ping 127.0.0.1 -n 40 > nul && "C:\Users\Admin\AppData\Roaming\EXE.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 403⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2752
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 403⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\EXE.exe"C:\Users\Admin\AppData\Roaming\EXE.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"4⤵PID:984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5180ad8fe3294d5cbf1508f3576c70f1c
SHA1831c8ef7b3efedae003526a87139e806c713ed24
SHA25613ca93f984b156e05041ddb9d172ddfd9b14456a243e432b1efbbe5f623b722e
SHA512d5a7ece40082978640d886b33729255c4b47a3bac6fac1973eb475599bf3c79795b2314dd4ae6c87685c56a0c9f9990a42a61d0ba9482be81489fae48900933c