Analysis
-
max time kernel
122s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
03/03/2025, 11:49
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
NEWORDER20874.exe
Resource
win7-20240903-en
8 signatures
150 seconds
General
-
Target
NEWORDER20874.exe
-
Size
1.0MB
-
MD5
eba6091e692e5babd8aa6cda1ec38b3d
-
SHA1
f2c9dd10b786339298caffa04891228b8415e650
-
SHA256
fcb4f6bf4809eb3c287e9fe90a8c6396327976b48af1c0552ab5491f0e45c4fc
-
SHA512
dfa6f7c0577d0176c16b0a9c90bfcad8061c69984f6684d0cf2d8ae742e9a9332e68ed909d1dac825922ee91807c032d1a88fafe70917a2a14cbc6ffe7ad95b9
-
SSDEEP
24576:0u6J33O0c+JY5UZ+XC0kGso6Fayp4q1hAMamWY:Ou0c++OCvkGs9FaypB1hOY
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
@qwerty90123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 764 set thread context of 4852 764 NEWORDER20874.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEWORDER20874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4852 RegSvcs.exe 4852 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 764 NEWORDER20874.exe 764 NEWORDER20874.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4852 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 764 wrote to memory of 4852 764 NEWORDER20874.exe 88 PID 764 wrote to memory of 4852 764 NEWORDER20874.exe 88 PID 764 wrote to memory of 4852 764 NEWORDER20874.exe 88 PID 764 wrote to memory of 4852 764 NEWORDER20874.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEWORDER20874.exe"C:\Users\Admin\AppData\Local\Temp\NEWORDER20874.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\NEWORDER20874.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-