Analysis
-
max time kernel
119s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/10/2024, 01:33
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20240903-en
General
-
Target
Purchase order.exe
-
Size
1.4MB
-
MD5
4c363afc82b0757d2723ff1287ab85de
-
SHA1
eae78234d3125edb5e161641b1c61dfab9456a46
-
SHA256
0787749d9897612314975e2943139157efcff4dbf604323d3d950c76b7555719
-
SHA512
c202cb6c3b8bef7cb556c335595c03e7da412e00466491e3bbbec15391bec8250d944ada1eb4b4e5d6215d39c2f28996a025a6de78243570382cf188744d8ac3
-
SSDEEP
24576:szSWNKs08nmbdXiQsGgJF2B+xaJ/ncPUoN0eaxn7wymHinDVw2iTYYuX0J:gSPGyXi0gbKCikPPN0fxn7NmHinDVw2e
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
webmaster - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2612 powershell.exe 3000 powershell.exe 2804 powershell.exe 676 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2920 set thread context of 2580 2920 Purchase order.exe 34 PID 2580 set thread context of 1048 2580 Purchase order.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2496 schtasks.exe 2932 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3000 powershell.exe 2612 powershell.exe 2804 powershell.exe 676 powershell.exe 1048 Purchase order.exe 1048 Purchase order.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3000 powershell.exe Token: SeDebugPrivilege 2612 powershell.exe Token: SeDebugPrivilege 2804 powershell.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 1048 Purchase order.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2920 wrote to memory of 2612 2920 Purchase order.exe 28 PID 2920 wrote to memory of 2612 2920 Purchase order.exe 28 PID 2920 wrote to memory of 2612 2920 Purchase order.exe 28 PID 2920 wrote to memory of 2612 2920 Purchase order.exe 28 PID 2920 wrote to memory of 3000 2920 Purchase order.exe 30 PID 2920 wrote to memory of 3000 2920 Purchase order.exe 30 PID 2920 wrote to memory of 3000 2920 Purchase order.exe 30 PID 2920 wrote to memory of 3000 2920 Purchase order.exe 30 PID 2920 wrote to memory of 2496 2920 Purchase order.exe 32 PID 2920 wrote to memory of 2496 2920 Purchase order.exe 32 PID 2920 wrote to memory of 2496 2920 Purchase order.exe 32 PID 2920 wrote to memory of 2496 2920 Purchase order.exe 32 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2920 wrote to memory of 2580 2920 Purchase order.exe 34 PID 2580 wrote to memory of 2804 2580 Purchase order.exe 35 PID 2580 wrote to memory of 2804 2580 Purchase order.exe 35 PID 2580 wrote to memory of 2804 2580 Purchase order.exe 35 PID 2580 wrote to memory of 2804 2580 Purchase order.exe 35 PID 2580 wrote to memory of 676 2580 Purchase order.exe 37 PID 2580 wrote to memory of 676 2580 Purchase order.exe 37 PID 2580 wrote to memory of 676 2580 Purchase order.exe 37 PID 2580 wrote to memory of 676 2580 Purchase order.exe 37 PID 2580 wrote to memory of 2932 2580 Purchase order.exe 38 PID 2580 wrote to memory of 2932 2580 Purchase order.exe 38 PID 2580 wrote to memory of 2932 2580 Purchase order.exe 38 PID 2580 wrote to memory of 2932 2580 Purchase order.exe 38 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41 PID 2580 wrote to memory of 1048 2580 Purchase order.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\IxumRsOtTdrVAu.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IxumRsOtTdrVAu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp88EE.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2496
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wlBldyvi.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wlBldyvi" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB9DD.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c1600ff54ec469399fdac4c69fd2750c
SHA17d59f36beeaa8bf2ed1f141d5b1fa24b5edb7495
SHA2569e92924f3ec9d8685338ce94281e5dcc573fdb7792e47ff20994cb1411e1fe32
SHA51231258d5e802eab16062df0980d9c6935890b1e4bc178f2a422ce764d1212a129832fe34a7f62b9671633bf1fe6e711b8c67cc12be8bc791e05aaddffaac1cf46
-
Filesize
1KB
MD5f2318ecbef5c4dff0abd8b7a31f5fc99
SHA16dd09a37a9ba3a3e4250c385a0958b33b60f7c6f
SHA25601d01f1ddcc0091eb1a23c577f6ee6ebcafa8f0a59f5f784d582a1b153b39cfa
SHA51274d84df05f6e5329171e822d5a1fd2e4fdd8fcb0e59d5e69b26f6e1cf94d007c86d2d9458f220f0c216d6df0b8ffc7add8f63d55e7e1f3b14ae71a2de69e9244
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5e1a1ece94b7d1db06477f24a305df861
SHA1fd84f43fef76beb40ccd94751c954080444696de
SHA256906cccb58af1b445f0496469d674f771c314bffbe2b27d76d577630c9cc951c1
SHA512949531cd728cc6fdb3be867cd7394f9eb714ead09277497e3881f5a478c4cf4b7962a530a3a99a9c475139f7e14a2488526dc5ef2eb6b9208459189ad5cca511
-
Filesize
1.4MB
MD54c363afc82b0757d2723ff1287ab85de
SHA1eae78234d3125edb5e161641b1c61dfab9456a46
SHA2560787749d9897612314975e2943139157efcff4dbf604323d3d950c76b7555719
SHA512c202cb6c3b8bef7cb556c335595c03e7da412e00466491e3bbbec15391bec8250d944ada1eb4b4e5d6215d39c2f28996a025a6de78243570382cf188744d8ac3