Analysis
-
max time kernel
92s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt GO23B005XXXX024.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Receipt GO23B005XXXX024.exe
Resource
win10v2004-20241007-en
General
-
Target
Payment Receipt GO23B005XXXX024.exe
-
Size
1.1MB
-
MD5
eb825525a859ea9849df1e834b1ad616
-
SHA1
2ac5df9260b61026d830ee922d673454addf4874
-
SHA256
706a82f9a21ca0e5a2c87de18ce323764eeb489737c9c165f89ce4745b946053
-
SHA512
458782549f5a7ab96e87155afa642ee423fc09c07641d8d9409ccffcf6d7e5fb6213e6b3077cfb5bbef4f55eaf9f87b63bea226509f2a193b725e00e9470ee15
-
SSDEEP
24576:4u6J33O0c+JY5UZ+XC0kGso6FaAXUbzkhHVErGrWY:yu0c++OCvkGs9FaAEfkhyY
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yGbzOMp = "C:\\Users\\Admin\\AppData\\Roaming\\yGbzOMp\\yGbzOMp.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2996 set thread context of 5052 2996 Payment Receipt GO23B005XXXX024.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Receipt GO23B005XXXX024.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 5052 RegSvcs.exe 5052 RegSvcs.exe 5052 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2996 Payment Receipt GO23B005XXXX024.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5052 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2996 Payment Receipt GO23B005XXXX024.exe 2996 Payment Receipt GO23B005XXXX024.exe 2996 Payment Receipt GO23B005XXXX024.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2996 Payment Receipt GO23B005XXXX024.exe 2996 Payment Receipt GO23B005XXXX024.exe 2996 Payment Receipt GO23B005XXXX024.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 5052 2996 Payment Receipt GO23B005XXXX024.exe 84 PID 2996 wrote to memory of 5052 2996 Payment Receipt GO23B005XXXX024.exe 84 PID 2996 wrote to memory of 5052 2996 Payment Receipt GO23B005XXXX024.exe 84 PID 2996 wrote to memory of 5052 2996 Payment Receipt GO23B005XXXX024.exe 84 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Receipt GO23B005XXXX024.exe"C:\Users\Admin\AppData\Local\Temp\Payment Receipt GO23B005XXXX024.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Payment Receipt GO23B005XXXX024.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
275KB
MD541e7dafa21b0a359b8a8e201c3a2e013
SHA1669e4baa75efef7d2abdbeff7243ee59a9200a98
SHA2562de32e0c36e7194b18f7e657fabad17e4690562d444cf7e540a4bf2fb352bf4e
SHA51274793bfeffefca5c35ea3f13d822544ee35d77af469d01a31c94bc8bae9a8f3cb387dc639c9970de086b4f8cf5a614ac93100dc85b001e3be0330f360b85b644