Analysis
-
max time kernel
106s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2025 01:11
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order.exe
Resource
win7-20240729-en
General
-
Target
Purchase order.exe
-
Size
986KB
-
MD5
9264f617827a682e6002378e6b61fd83
-
SHA1
2e3c94f5df909457134b2297f67f8b766151ea92
-
SHA256
02073441269355d1447b6dec157de4b6fe104d3aba666caf1cefac726abc5539
-
SHA512
a5a48b1e554861c5ad13fe5504ea04807fe485f79dab9e3a0b76a241f5ca08a7ff2b1b3dba8cbdb8f656975f9841592423bae30e66b9cdc34139f41ac4a494a3
-
SSDEEP
24576:uRmJkcoQricOIQxiZY1iaCpUliXtZTgtdsnvBcD3:7JZoQrbTFZY1iaCpnkdIvBcb
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 14 api.ipify.org 15 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3508 set thread context of 2536 3508 Purchase order.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2536 RegSvcs.exe 2536 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2540 Purchase order.exe 4848 Purchase order.exe 3508 Purchase order.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2536 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2540 Purchase order.exe 2540 Purchase order.exe 4848 Purchase order.exe 4848 Purchase order.exe 3508 Purchase order.exe 3508 Purchase order.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2540 Purchase order.exe 2540 Purchase order.exe 4848 Purchase order.exe 4848 Purchase order.exe 3508 Purchase order.exe 3508 Purchase order.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2540 wrote to memory of 3248 2540 Purchase order.exe 83 PID 2540 wrote to memory of 3248 2540 Purchase order.exe 83 PID 2540 wrote to memory of 3248 2540 Purchase order.exe 83 PID 2540 wrote to memory of 4848 2540 Purchase order.exe 84 PID 2540 wrote to memory of 4848 2540 Purchase order.exe 84 PID 2540 wrote to memory of 4848 2540 Purchase order.exe 84 PID 4848 wrote to memory of 5008 4848 Purchase order.exe 85 PID 4848 wrote to memory of 5008 4848 Purchase order.exe 85 PID 4848 wrote to memory of 5008 4848 Purchase order.exe 85 PID 4848 wrote to memory of 3508 4848 Purchase order.exe 86 PID 4848 wrote to memory of 3508 4848 Purchase order.exe 86 PID 4848 wrote to memory of 3508 4848 Purchase order.exe 86 PID 3508 wrote to memory of 2536 3508 Purchase order.exe 87 PID 3508 wrote to memory of 2536 3508 Purchase order.exe 87 PID 3508 wrote to memory of 2536 3508 Purchase order.exe 87 PID 3508 wrote to memory of 2536 3508 Purchase order.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"3⤵PID:5008
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
259KB
MD5139854402bb509362cb4aadd70cf9c6f
SHA19521816f131fd7f6533e0c45d83f26096e8cea2b
SHA2560fc26679551231795003b5add7711fc3f0af05521e623283a97797ac72408c86
SHA5121631eb8e5097b05473ee5107165a149ca283455db5f54a4a629eb773310e99aee89ff1d22f5979f0a5fc144c754d007b643a19d489b9d78bf3ed1167bdf43ff4
-
Filesize
262KB
MD59fb8b318e87777398ac409babb05792a
SHA19e0e1309d9e9ae2bcaa457340d24eb1c4cc746ad
SHA2569bd6583c633f2013f47a12feb4218af13554784fdb8fba473a0b29ada2bbed21
SHA512ee9d77aeeea5e1a05238f770326a12ae13174f53b54727652862266968f34c995aa1b3c2d9f0cd8912ba69aab0b58b7d15c9746611c17d24a2325ab787f5443d