Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20240903-en
General
-
Target
Purchase order.exe
-
Size
1.5MB
-
MD5
fb3ad7e9cb5938ad1af8facf52693b27
-
SHA1
4a45c5429a503e8730ebc5261441e91b963510d1
-
SHA256
d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793
-
SHA512
bf4dd0c6a664e3e4b3fd584a5bc11d55fd874eabceee066f78ea5eb6ce0ab25fb08732cb1eb8baa96beae173474ff4f761b453a8e8544171e16703b1acbf1b60
-
SSDEEP
24576:8IFcjHUVcxTE59dcvuc8kXeRYPps4GY4a9qJVX8ScEhAs3PseK0dHosEfzbm:8IFczdarcW/hySXYh9UPvhAKPFFOsw
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2628 powershell.exe 2100 powershell.exe 1248 powershell.exe 2892 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2768 set thread context of 1140 2768 Purchase order.exe 36 PID 1140 set thread context of 300 1140 Purchase order.exe 43 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2588 schtasks.exe 1720 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2628 powershell.exe 2892 powershell.exe 1248 powershell.exe 2100 powershell.exe 300 Purchase order.exe 300 Purchase order.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2628 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 1248 powershell.exe Token: SeDebugPrivilege 2100 powershell.exe Token: SeDebugPrivilege 300 Purchase order.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2892 2768 Purchase order.exe 30 PID 2768 wrote to memory of 2892 2768 Purchase order.exe 30 PID 2768 wrote to memory of 2892 2768 Purchase order.exe 30 PID 2768 wrote to memory of 2892 2768 Purchase order.exe 30 PID 2768 wrote to memory of 2628 2768 Purchase order.exe 32 PID 2768 wrote to memory of 2628 2768 Purchase order.exe 32 PID 2768 wrote to memory of 2628 2768 Purchase order.exe 32 PID 2768 wrote to memory of 2628 2768 Purchase order.exe 32 PID 2768 wrote to memory of 2588 2768 Purchase order.exe 34 PID 2768 wrote to memory of 2588 2768 Purchase order.exe 34 PID 2768 wrote to memory of 2588 2768 Purchase order.exe 34 PID 2768 wrote to memory of 2588 2768 Purchase order.exe 34 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 2768 wrote to memory of 1140 2768 Purchase order.exe 36 PID 1140 wrote to memory of 2100 1140 Purchase order.exe 37 PID 1140 wrote to memory of 2100 1140 Purchase order.exe 37 PID 1140 wrote to memory of 2100 1140 Purchase order.exe 37 PID 1140 wrote to memory of 2100 1140 Purchase order.exe 37 PID 1140 wrote to memory of 1248 1140 Purchase order.exe 38 PID 1140 wrote to memory of 1248 1140 Purchase order.exe 38 PID 1140 wrote to memory of 1248 1140 Purchase order.exe 38 PID 1140 wrote to memory of 1248 1140 Purchase order.exe 38 PID 1140 wrote to memory of 1720 1140 Purchase order.exe 39 PID 1140 wrote to memory of 1720 1140 Purchase order.exe 39 PID 1140 wrote to memory of 1720 1140 Purchase order.exe 39 PID 1140 wrote to memory of 1720 1140 Purchase order.exe 39 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43 PID 1140 wrote to memory of 300 1140 Purchase order.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eouOCEx.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eouOCEx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9463.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wlBldyvi.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1248
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wlBldyvi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC62C.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e862903e096beab2d1742f0f3b52ce18
SHA14b0f8faa49b47a17316ee0ba961fd9bf82dc44b2
SHA256503ea70e7c13329da81c03a583a8558106b4ac1c25635abe42c398e1e221cf65
SHA5125a6f39001071a7d299c07eedfb399a9c387e2a4664357a187cfd55bc1e43a90fbb24ba521df5e09342968ce6707eb7c1a9d616bf68c1bf53e0344614a74b8da5
-
Filesize
1KB
MD5f2318ecbef5c4dff0abd8b7a31f5fc99
SHA16dd09a37a9ba3a3e4250c385a0958b33b60f7c6f
SHA25601d01f1ddcc0091eb1a23c577f6ee6ebcafa8f0a59f5f784d582a1b153b39cfa
SHA51274d84df05f6e5329171e822d5a1fd2e4fdd8fcb0e59d5e69b26f6e1cf94d007c86d2d9458f220f0c216d6df0b8ffc7add8f63d55e7e1f3b14ae71a2de69e9244
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b28b05e09a0b3b445907a3f375b57ea5
SHA1619a93e739bba4c9600f617aba831bf97af9ed55
SHA2564b4242fb12f7b2f35f3f8a51b814218957cc0e0cf53822b29f5391437ae3be10
SHA5123f5036400c25d7c109131d108d6f7bb6bfc4bfdd786b14f18361b611e2134388404ed6acf770785e9704f0fe8849141502911c67cff844cc44b286a4c3efe548
-
Filesize
1.5MB
MD5fb3ad7e9cb5938ad1af8facf52693b27
SHA14a45c5429a503e8730ebc5261441e91b963510d1
SHA256d5d6f7922d87a58322e5d4ace6819497d0942b3b22dc10c52f5a37cad8e42793
SHA512bf4dd0c6a664e3e4b3fd584a5bc11d55fd874eabceee066f78ea5eb6ce0ab25fb08732cb1eb8baa96beae173474ff4f761b453a8e8544171e16703b1acbf1b60