Analysis
-
max time kernel
347s -
max time network
317s -
platform
windows7_x64 -
resource
win7-20240903-de -
resource tags
arch:x64arch:x86image:win7-20240903-delocale:de-deos:windows7-x64systemwindows -
submitted
12-09-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
Invoice N74561.exe
Resource
win7-20240903-de
Behavioral task
behavioral2
Sample
Invoice N74561.exe
Resource
win10v2004-20240802-de
General
-
Target
Invoice N74561.exe
-
Size
1.2MB
-
MD5
a9c63220335a413f3968e2383ccec56b
-
SHA1
a182bff10f22a7d04d7da5e03f4c99768b436176
-
SHA256
59a8996eecd3446be4d9d67ac5adaaae32c80eb7096a2f24280dc6bf7922bfe8
-
SHA512
bd6e361329af62e681b4ab0d6a2569a76a329d37a32036609e5f7311128e1e29a5009988067b14aff126231b46802c55025f4d5903edb4ee4852525b35b845c3
-
SSDEEP
24576:kqDEvCTbMWu7rQYlBQcBiT6rprG8aDZ+B1blRPQ:kTvC/MTQYxsWR7aDU
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1749457201:AAGWIY2QPzrHZIumAIUsWjyRAEWcJrauccY/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 3 IoCs
resource yara_rule behavioral1/memory/2092-19-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2092-23-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2092-21-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\zword.vbs zword.exe -
Executes dropped EXE 1 IoCs
pid Process 1364 zword.exe -
Loads dropped DLL 1 IoCs
pid Process 2984 Invoice N74561.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000016d4a-10.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1364 set thread context of 2092 1364 zword.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Invoice N74561.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zword.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2092 RegSvcs.exe 2092 RegSvcs.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1084 taskmgr.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1364 zword.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2092 RegSvcs.exe Token: SeDebugPrivilege 1084 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2984 Invoice N74561.exe 2984 Invoice N74561.exe 1364 zword.exe 1364 zword.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2984 Invoice N74561.exe 2984 Invoice N74561.exe 1364 zword.exe 1364 zword.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe 1084 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2092 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1364 2984 Invoice N74561.exe 30 PID 2984 wrote to memory of 1364 2984 Invoice N74561.exe 30 PID 2984 wrote to memory of 1364 2984 Invoice N74561.exe 30 PID 2984 wrote to memory of 1364 2984 Invoice N74561.exe 30 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 PID 1364 wrote to memory of 2092 1364 zword.exe 31 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Invoice N74561.exe"C:\Users\Admin\AppData\Local\Temp\Invoice N74561.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\zFinish\zword.exe"C:\Users\Admin\AppData\Local\Temp\Invoice N74561.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Invoice N74561.exe"3⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:2092
-
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2632
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5a9c63220335a413f3968e2383ccec56b
SHA1a182bff10f22a7d04d7da5e03f4c99768b436176
SHA25659a8996eecd3446be4d9d67ac5adaaae32c80eb7096a2f24280dc6bf7922bfe8
SHA512bd6e361329af62e681b4ab0d6a2569a76a329d37a32036609e5f7311128e1e29a5009988067b14aff126231b46802c55025f4d5903edb4ee4852525b35b845c3