Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 03:29
Static task
static1
Behavioral task
behavioral1
Sample
New order.exe
Resource
win7-20240903-en
General
-
Target
New order.exe
-
Size
786KB
-
MD5
08d7fbb6862dcb82dc8cde80068db6c3
-
SHA1
86d0b5b41b9061d27e09571e5569e1eb62552367
-
SHA256
d560c0f26753eba85047f309ddc73797dc7b3c7e14d9b0328eaead50ef7c1338
-
SHA512
06e1e9b676af40fdc7eec3aafd6a7b057b44616c0117e09a05d9351fd3811ac0c440fc9c5b5b03d8d52fe882af47253137d3c5d7e02ddca067ca1f316f040a32
-
SSDEEP
24576:72T8S0ck7WVwEddb0euZ5P13lbTYDRWzHrXN9q:7E8S0cd62nu71lbc4zbLq
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.thelamalab.com - Port:
587 - Username:
[email protected] - Password:
Thel@malab@20!9 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2748 powershell.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2800 set thread context of 2592 2800 New order.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2592 vbc.exe 2592 vbc.exe 2748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2592 vbc.exe Token: SeDebugPrivilege 2748 powershell.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2800 wrote to memory of 2748 2800 New order.exe 31 PID 2800 wrote to memory of 2748 2800 New order.exe 31 PID 2800 wrote to memory of 2748 2800 New order.exe 31 PID 2800 wrote to memory of 2748 2800 New order.exe 31 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33 PID 2800 wrote to memory of 2592 2800 New order.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\New order.exe"C:\Users\Admin\AppData\Local\Temp\New order.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\New order.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-