Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 14:22
Static task
static1
Behavioral task
behavioral1
Sample
purchaseorderTB1920PO128.exe
Resource
win7-20240903-en
General
-
Target
purchaseorderTB1920PO128.exe
-
Size
834KB
-
MD5
bdb9d54e0a75220f742b55d10f11d4ee
-
SHA1
e8f5e71b326b4f40347d9b83b12c75074b7c1a18
-
SHA256
4a2262967b00cd610107b403747ed727fe8ca66d26716c4cee9b7d4c6ba81db2
-
SHA512
c8b7d7f928d5281abed33c5378ee49d57b145ada70213f4d75de70e3fd8c1a211972ac157ab35b52d278813e5ea9683677738850f2bcb1573152667329a01467
-
SSDEEP
12288:fJzsqbYwDcoze0+G02Vg/uGsXaRVz/dHCjNLhFGcVjdnIiWyEa7gP7r9r/+ppppN:19b9G0Nm/uGsqRziZLFSiWFa7g1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1812 powershell.exe 1944 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3004 set thread context of 1632 3004 purchaseorderTB1920PO128.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language purchaseorderTB1920PO128.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language purchaseorderTB1920PO128.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2660 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1632 purchaseorderTB1920PO128.exe 1632 purchaseorderTB1920PO128.exe 1812 powershell.exe 1944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1632 purchaseorderTB1920PO128.exe Token: SeDebugPrivilege 1812 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3004 wrote to memory of 1812 3004 purchaseorderTB1920PO128.exe 31 PID 3004 wrote to memory of 1812 3004 purchaseorderTB1920PO128.exe 31 PID 3004 wrote to memory of 1812 3004 purchaseorderTB1920PO128.exe 31 PID 3004 wrote to memory of 1812 3004 purchaseorderTB1920PO128.exe 31 PID 3004 wrote to memory of 1944 3004 purchaseorderTB1920PO128.exe 33 PID 3004 wrote to memory of 1944 3004 purchaseorderTB1920PO128.exe 33 PID 3004 wrote to memory of 1944 3004 purchaseorderTB1920PO128.exe 33 PID 3004 wrote to memory of 1944 3004 purchaseorderTB1920PO128.exe 33 PID 3004 wrote to memory of 2660 3004 purchaseorderTB1920PO128.exe 35 PID 3004 wrote to memory of 2660 3004 purchaseorderTB1920PO128.exe 35 PID 3004 wrote to memory of 2660 3004 purchaseorderTB1920PO128.exe 35 PID 3004 wrote to memory of 2660 3004 purchaseorderTB1920PO128.exe 35 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37 PID 3004 wrote to memory of 1632 3004 purchaseorderTB1920PO128.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\purchaseorderTB1920PO128.exe"C:\Users\Admin\AppData\Local\Temp\purchaseorderTB1920PO128.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\purchaseorderTB1920PO128.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1812
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GNxLsnKfyNDAU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GNxLsnKfyNDAU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7AE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2660
-
-
C:\Users\Admin\AppData\Local\Temp\purchaseorderTB1920PO128.exe"C:\Users\Admin\AppData\Local\Temp\purchaseorderTB1920PO128.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD547cd27e9f5ff6e4ba4eb6e7268dea30c
SHA114a2a1c99854f89a407a030235a9eed24e79fdab
SHA256a9e3ddb941116fc48b0a0e6840d9ada8bdc0931b83dad399e0cc76a42058131f
SHA512ccd4892a22cdd89269a4f1cd1d33631bd8510a43abcc22f58bffcebaf732ae285d0dbb70d779cc4a12a3c6ec8ee0864f8f1f37ac092af8eab65c62fa10b63096
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD575fa7486804c5121d89107ad570168fd
SHA144fad3b7777cd501d6a9fb78c896147598a282ac
SHA256b096886d138a9f5148cc9f58c6ad2e5243beee2e38cf59d155f2da686987c5a2
SHA512d6e0365a3195eeb93126c1dd212d93656bd123d47a0033676773033c9729629d8ed704235ee070a70c868e4653f3aa3067aa7f963101d6b25d166224eac24310