Analysis
-
max time kernel
140s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31/08/2024, 18:40
Behavioral task
behavioral1
Sample
Arrival Notification AWB PL invoice & BL.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Arrival Notification AWB PL invoice & BL.exe
Resource
win10v2004-20240802-en
General
-
Target
Arrival Notification AWB PL invoice & BL.exe
-
Size
701KB
-
MD5
b536f38b18b4d21973e8d2c19620da37
-
SHA1
63f4a671f9536e5505b572def8375a618fb2919c
-
SHA256
78ba6f6da444f33682e0878941f2258ea538b85eb1b7b96d7d15e19656327664
-
SHA512
8520958ec8f32c32811a772f4789ebf313f674b899f7e718e84e4a6c90e2ade41b11b5f0ecebe61a6018192d48e74ccf9db96bf906a2ced896f4a2fe084fd3fb
-
SSDEEP
6144:3kzwuh8BSfN7Bv16pDBCNUg5v2nZuvBdHI6WTJ1JK6ipY9ID382FI1JtpkmOdd0/:3YwutfN7BvQ02iITJu6tGs+ODpkG
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
marcellinus
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral2/memory/5464-1-0x00000000009B0000-0x0000000000A66000-memory.dmp family_agenttesla behavioral2/memory/5288-12-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Arrival Notification AWB PL invoice & BL.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Arrival Notification AWB PL invoice & BL.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Arrival Notification AWB PL invoice & BL.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KsVAR = "C:\\Users\\Admin\\AppData\\Roaming\\KsVAR\\KsVAR.exe" Arrival Notification AWB PL invoice & BL.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5464 set thread context of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Arrival Notification AWB PL invoice & BL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Arrival Notification AWB PL invoice & BL.exe -
System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 1 IoCs
Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.
pid Process 1736 netsh.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 5464 Arrival Notification AWB PL invoice & BL.exe 5464 Arrival Notification AWB PL invoice & BL.exe 5464 Arrival Notification AWB PL invoice & BL.exe 5288 Arrival Notification AWB PL invoice & BL.exe 5288 Arrival Notification AWB PL invoice & BL.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5464 Arrival Notification AWB PL invoice & BL.exe Token: SeDebugPrivilege 5288 Arrival Notification AWB PL invoice & BL.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5464 wrote to memory of 5288 5464 Arrival Notification AWB PL invoice & BL.exe 97 PID 5288 wrote to memory of 1736 5288 Arrival Notification AWB PL invoice & BL.exe 99 PID 5288 wrote to memory of 1736 5288 Arrival Notification AWB PL invoice & BL.exe 99 PID 5288 wrote to memory of 1736 5288 Arrival Notification AWB PL invoice & BL.exe 99 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Arrival Notification AWB PL invoice & BL.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Arrival Notification AWB PL invoice & BL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Arrival Notification AWB PL invoice & BL.exe"C:\Users\Admin\AppData\Local\Temp\Arrival Notification AWB PL invoice & BL.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5464 -
C:\Users\Admin\AppData\Local\Temp\Arrival Notification AWB PL invoice & BL.exe"C:\Users\Admin\AppData\Local\Temp\Arrival Notification AWB PL invoice & BL.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- outlook_office_path
- outlook_win_path
PID:5288 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Wi-Fi Discovery
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Arrival Notification AWB PL invoice & BL.exe.log
Filesize1KB
MD5fc13935f3038bdde6cb484249fbff668
SHA1a4c32013e6d59bf1eb1a5119456965de191e62b8
SHA256de064c569a5f4edaf2da91d7bcb82bab06a35190b699cede1da0aa616a23d676
SHA5125817275af0f8a48eb1e008d39f62fb3582db9a2d21a806e9f9ee36fbfd799fb17e91f0e3686f4b236724fe78f14ae7f40cd3755f0ec0fb6734ce42f996b798f7