Windows
Analysis Report
NEW_ORDER_12-18-23.exe
Overview
General Information
Detection
AgentTesla, PureLog Stealer
Score: | 100 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
Contains functionality to log keystrokes (.Net Source)
Downloads files with wrong headers with respect to MIME Content-Type
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Yara detected Costura Assembly Loader
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match
Classification
- System is w10x64
NEW_ORDER_12-18-23.exe (PID: 7272 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7372 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7380 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7388 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7396 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7404 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7412 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7420 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7428 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7436 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4) NEW_ORDER_12-18-23.exe (PID: 7444 cmdline:
C:\Users\u ser\Deskto p\NEW_ORDE R_12-18-23 .exe MD5: 70FAC030623DEB6181201FD0CA321BB4)
spof.exe (PID: 7500 cmdline:
"C:\Users\ user\AppDa ta\Roaming \spof.exe" MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7708 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7716 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7724 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7732 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7740 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7748 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7756 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7764 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7772 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 7780 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4)
spof.exe (PID: 7948 cmdline:
"C:\Users\ user\AppDa ta\Roaming \spof.exe" MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8012 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8020 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8028 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8036 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8044 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8052 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8060 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8068 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8076 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4) spof.exe (PID: 8084 cmdline:
C:\Users\u ser\AppDat a\Roaming\ spof.exe MD5: 70FAC030623DEB6181201FD0CA321BB4)
- cleanup
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
Agent Tesla, AgentTesla | A .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel. |
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.asiaparadisehotel.com", "Username": "mangirish@asiaparadisehotel.com", "Password": "H?2=G%Dc0S^Q"}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
JoeSecurity_CredentialStealer | Yara detected Credential Stealer | Joe Security | ||
JoeSecurity_AgentTesla_1 | Yara detected AgentTesla | Joe Security | ||
Click to see the 34 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
JoeSecurity_CosturaAssemblyLoader | Yara detected Costura Assembly Loader | Joe Security | ||
Click to see the 37 entries |
⊘No Sigma rule has matched
⊘No Snort rule has matched
Click to jump to signature section
Show All Signature Results
AV Detection |
---|
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: | ||
Source: | Avira URL Cloud: |
Source: | Malware Configuration Extractor: |
Source: | Virustotal: | Perma Link | ||
Source: | Virustotal: | Perma Link |
Source: | ReversingLabs: | |||
Source: | Virustotal: | Perma Link |
Source: | Virustotal: | Perma Link | ||
Source: | ReversingLabs: |
Source: | Joe Sandbox ML: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Binary string: | ||
Source: | Binary string: |
Networking |
---|
Source: | Bad PDF prefix: |