Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16/10/2024, 10:39
Static task
static1
Behavioral task
behavioral1
Sample
Oustanding Invoices.exe
Resource
win7-20240903-en
General
-
Target
Oustanding Invoices.exe
-
Size
788KB
-
MD5
65061801d64c7154fdcafe07289fdd64
-
SHA1
88f6c3bc401aeddf395a409ece7ae3f44721a06c
-
SHA256
95e8ab1f03e2ab0b9b2591d310a42813726f13d6d2a4301bfd117c1c0c6fe9e1
-
SHA512
58aedadb06f2e0f664022832d43bf34136573db6106d0b620cd6554c1f31948eb89b81074bd932754f0befddab1a6144fac4256e90190228aff5520e81cf841f
-
SSDEEP
12288:DHANG3RciXWNhnABLQ8LbMUeKIoBg1z+W0Cla+ve7bAvANa24jVY:DHxcVjABRYMIYOzp0sjvzE1z
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
oadc jzrw bmvr klnl
Extracted
agenttesla
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
oadc jzrw bmvr klnl - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2536 powershell.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 32 544 msiexec.exe 35 544 msiexec.exe 43 544 msiexec.exe 47 544 msiexec.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 34 api.ipify.org 35 api.ipify.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 544 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2536 powershell.exe 544 msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Oustanding Invoices.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 2536 powershell.exe 544 msiexec.exe 544 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2536 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 2536 powershell.exe Token: SeIncreaseQuotaPrivilege 2536 powershell.exe Token: SeSecurityPrivilege 2536 powershell.exe Token: SeTakeOwnershipPrivilege 2536 powershell.exe Token: SeLoadDriverPrivilege 2536 powershell.exe Token: SeSystemProfilePrivilege 2536 powershell.exe Token: SeSystemtimePrivilege 2536 powershell.exe Token: SeProfSingleProcessPrivilege 2536 powershell.exe Token: SeIncBasePriorityPrivilege 2536 powershell.exe Token: SeCreatePagefilePrivilege 2536 powershell.exe Token: SeBackupPrivilege 2536 powershell.exe Token: SeRestorePrivilege 2536 powershell.exe Token: SeShutdownPrivilege 2536 powershell.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeSystemEnvironmentPrivilege 2536 powershell.exe Token: SeRemoteShutdownPrivilege 2536 powershell.exe Token: SeUndockPrivilege 2536 powershell.exe Token: SeManageVolumePrivilege 2536 powershell.exe Token: 33 2536 powershell.exe Token: 34 2536 powershell.exe Token: 35 2536 powershell.exe Token: 36 2536 powershell.exe Token: SeDebugPrivilege 544 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3456 wrote to memory of 2536 3456 Oustanding Invoices.exe 86 PID 3456 wrote to memory of 2536 3456 Oustanding Invoices.exe 86 PID 3456 wrote to memory of 2536 3456 Oustanding Invoices.exe 86 PID 2536 wrote to memory of 544 2536 powershell.exe 96 PID 2536 wrote to memory of 544 2536 powershell.exe 96 PID 2536 wrote to memory of 544 2536 powershell.exe 96 PID 2536 wrote to memory of 544 2536 powershell.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\Oustanding Invoices.exe"C:\Users\Admin\AppData\Local\Temp\Oustanding Invoices.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Brdrepar62=Get-Content -raw 'C:\Users\Admin\AppData\Roaming\gurlis\billeter\pli\Afmilitariserings233.Eft';$Upaavirkede=$Brdrepar62.SubString(4815,3);.$Upaavirkede($Brdrepar62) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:544
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
73KB
MD53c1a789a0b8eb93551d9b3eb30ccc48c
SHA1ede01fd5870ebcf773904c45b2fc8c47c2a39602
SHA256a3f5a7c3379d671e7ef53fef6a9ddfa0d1fd1ff0f9dd9ae1a05ab538ece790a2
SHA512b8d1045c54cd0eaa7f9b928c8cbf6cf95e523260c7242f79b8fcdad87e7c27812b1d3c18dbc46625bb29beffa212c7a5120c6d64055e59c94d28c2925906133b
-
Filesize
315KB
MD50c95e9f4be2642e1c3a43973e737063f
SHA146e982b415faafbad8ae2326a16d23db2c81bdcf
SHA256a7bfa185bde97883232745ddec260b0b1335ff3a3901cdc1e4952d8d0822f225
SHA512065ff3bd02f4df0ccc3a19ac7ff15d24fc22e5fc079854488b1e1612ca6d87276a3f8459da99304cf12feca2700d7d730a882cc28f95b40f6eaa1deb0a1c5079