Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 05:41
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-20240802-en
General
-
Target
Purchase Order.exe
-
Size
934KB
-
MD5
f7f32729079353000cd97b90aa314cc1
-
SHA1
21dbddeea2b634263c8fbf0d6178a9751d2467b8
-
SHA256
8e29aa00863b1746ba25132f7ecb7bcb869d3a7e647dc8d6d3255491c5ac5212
-
SHA512
2c40c12b81e7c377ddf0a6691ebeedc895dcf02c9211a1563b840de735fab77968565b1d3d0c40cc0b2b583fd4bfa1c69f995fca758ea85f548bf5797b5bf847
-
SSDEEP
24576:U5dMbYk7zL1hJ5o/C+uOWiw5h6nnjqKoe:U5dkYk/phQ6+hIkjqKoe
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2524 powershell.exe 2448 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1744 set thread context of 2768 1744 Purchase Order.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2192 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2524 powershell.exe 2448 powershell.exe 2768 RegSvcs.exe 2768 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2524 powershell.exe Token: SeDebugPrivilege 2448 powershell.exe Token: SeDebugPrivilege 2768 RegSvcs.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2524 1744 Purchase Order.exe 30 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2448 1744 Purchase Order.exe 32 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2192 1744 Purchase Order.exe 33 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36 PID 1744 wrote to memory of 2768 1744 Purchase Order.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TESAYt.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TESAYt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC227.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD582066d030b603c90af2f3723a5e05f70
SHA1fc61477405bd81e211425c5f38736b26f16c97b8
SHA2562a994b9f7cb52a79cc8efe1c739f7ef72ba39f5af0f01b9db460e165edb75df4
SHA512ae831f26d4e19a0f17418613618e679220133c7e98e86c21fecd95e7db22dc950d023f2620a41d14eda5d6aeb0a7849f23cfc7d8d5a174ffd79e7d8bb9b27fdc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD526e5ef8b15ab47494ac47b0417478c6f
SHA1dd984c614d821727ee87d5ba3e2d04cfdcec0467
SHA2561b0ff7f1f6024e0989e3c70973dea4e9b2bf3240d7b0514a824e49ea19350dc9
SHA512d1c39dc123306a68c09fdf840eca40a46c9510649de828b3fb90377cdd803d15bd37f49ef793821d3cd4e4cea05e8b15627e29f693331e85d755f4a9feef91c6