Overview
overview
10Static
static
1NUEVA ORDE...3).zip
windows10-2004-x64
1a66e05684c...9c.eml
windows10-2004-x64
3Orden_NM04...df.rar
windows10-2004-x64
10Orden_NM04...df.exe
windows10-2004-x64
10Outlook-Icon.jpg
windows10-2004-x64
1Outlook-j1cm1hfd.png
windows10-2004-x64
1email-html-2.html
windows10-2004-x64
4email-plain-1.txt
windows10-2004-x64
1Analysis
-
max time kernel
89s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20250502-en -
resource tags
arch:x64arch:x86image:win10v2004-20250502-enlocale:en-usos:windows10-2004-x64system -
submitted
17/05/2025, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
NUEVA ORDEN - NM049300 FERMAXIA-password(QKmLgls3).zip
Resource
win10v2004-20250502-en
Behavioral task
behavioral2
Sample
a66e05684cd828e5a9b1771963a0121a13c7304a2a4037920dfb54d476575f9c.eml
Resource
win10v2004-20250502-en
Behavioral task
behavioral3
Sample
Orden_NM049300 FERMAXIA.pdf.rar
Resource
win10v2004-20250502-en
Behavioral task
behavioral4
Sample
Orden_NM049300 FERMAXIA.pdf.exe
Resource
win10v2004-20250502-en
Behavioral task
behavioral5
Sample
Outlook-Icon.jpg
Resource
win10v2004-20250502-en
Behavioral task
behavioral6
Sample
Outlook-j1cm1hfd.png
Resource
win10v2004-20250502-en
Behavioral task
behavioral7
Sample
email-html-2.html
Resource
win10v2004-20250502-en
Behavioral task
behavioral8
Sample
email-plain-1.txt
Resource
win10v2004-20250502-en
General
-
Target
Orden_NM049300 FERMAXIA.pdf.rar
-
Size
1.2MB
-
MD5
c17880bfc903d02a80f6b80e1abaafb4
-
SHA1
6b28c236aca016d67c705b58f3fee69e09ce920b
-
SHA256
e375e707631fd52a260161035ef7bf639f1d94338a169c733c6729f73d2eaf8b
-
SHA512
56e7e0e1d5c7762ea781c7c402db6c0e248ebe9e3cb0123ce9bafd3858091ec317b3bb750533e725071de107605e7b870c3b7868830ea48400b058bbb96ca06a
-
SSDEEP
24576:Bp6YIm4/bYfz3CgmpifFsIEV21zm/WNB0moL5F3ffr50ZQmx5+dxjuhIxq:BpiKLbfFsZ213NB095FHN0yA5w4Ixq
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.lampadari.gr - Port:
21 - Username:
[email protected] - Password:
P8P[uVeJU=vh
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Executes dropped EXE 2 IoCs
pid Process 2412 Orden_NM049300 FERMAXIA.pdf.exe 836 Orden_NM049300 FERMAXIA.pdf.exe -
Loads dropped DLL 3 IoCs
pid Process 2412 Orden_NM049300 FERMAXIA.pdf.exe 4364 Orden_NM049300 FERMAXIA.pdf.exe 836 Orden_NM049300 FERMAXIA.pdf.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 75 ip-api.com -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\servic\lensaftales.exe Orden_NM049300 FERMAXIA.pdf.exe File opened for modification C:\Windows\SysWOW64\servic\lensaftales.exe Orden_NM049300 FERMAXIA.pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4364 Orden_NM049300 FERMAXIA.pdf.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2412 Orden_NM049300 FERMAXIA.pdf.exe 4364 Orden_NM049300 FERMAXIA.pdf.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\dimensionsstabilt.ini Orden_NM049300 FERMAXIA.pdf.exe File opened for modification C:\Program Files (x86)\Common Files\Strandage\Engangsservicernes.ini Orden_NM049300 FERMAXIA.pdf.exe File opened for modification C:\Program Files (x86)\Common Files\dimensionsstabilt.ini Orden_NM049300 FERMAXIA.pdf.exe File opened for modification C:\Program Files (x86)\Common Files\Strandage\Engangsservicernes.ini Orden_NM049300 FERMAXIA.pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orden_NM049300 FERMAXIA.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orden_NM049300 FERMAXIA.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orden_NM049300 FERMAXIA.pdf.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3240 7zFM.exe 3240 7zFM.exe 4364 Orden_NM049300 FERMAXIA.pdf.exe 4364 Orden_NM049300 FERMAXIA.pdf.exe 3240 7zFM.exe 3240 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3240 7zFM.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2412 Orden_NM049300 FERMAXIA.pdf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 3240 7zFM.exe Token: 35 3240 7zFM.exe Token: SeSecurityPrivilege 3240 7zFM.exe Token: SeSecurityPrivilege 3240 7zFM.exe Token: SeDebugPrivilege 4364 Orden_NM049300 FERMAXIA.pdf.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3240 7zFM.exe 3240 7zFM.exe 3240 7zFM.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3240 wrote to memory of 2412 3240 7zFM.exe 103 PID 3240 wrote to memory of 2412 3240 7zFM.exe 103 PID 3240 wrote to memory of 2412 3240 7zFM.exe 103 PID 2412 wrote to memory of 4364 2412 Orden_NM049300 FERMAXIA.pdf.exe 107 PID 2412 wrote to memory of 4364 2412 Orden_NM049300 FERMAXIA.pdf.exe 107 PID 2412 wrote to memory of 4364 2412 Orden_NM049300 FERMAXIA.pdf.exe 107 PID 3240 wrote to memory of 836 3240 7zFM.exe 106 PID 3240 wrote to memory of 836 3240 7zFM.exe 106 PID 3240 wrote to memory of 836 3240 7zFM.exe 106 PID 2412 wrote to memory of 4364 2412 Orden_NM049300 FERMAXIA.pdf.exe 107 PID 2412 wrote to memory of 4364 2412 Orden_NM049300 FERMAXIA.pdf.exe 107
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Orden_NM049300 FERMAXIA.pdf.rar"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\7zO8AC4F608\Orden_NM049300 FERMAXIA.pdf.exe"C:\Users\Admin\AppData\Local\Temp\7zO8AC4F608\Orden_NM049300 FERMAXIA.pdf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\7zO8AC4F608\Orden_NM049300 FERMAXIA.pdf.exe"C:\Users\Admin\AppData\Local\Temp\7zO8AC4F608\Orden_NM049300 FERMAXIA.pdf.exe"3⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
C:\Users\Admin\AppData\Local\Temp\7zO8AC63A78\Orden_NM049300 FERMAXIA.pdf.exe"C:\Users\Admin\AppData\Local\Temp\7zO8AC63A78\Orden_NM049300 FERMAXIA.pdf.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:836
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41B
MD527d2c28b0e63d3fd739e20a94d602a95
SHA1cdba3ea533b1bcb3d58770bd9f84d2620890aabd
SHA25665d86cb89b14647b6df6f999e79e1ac3c8891b4b541a607abd3eae289f1c91f5
SHA512646e78f54c8e4be4cd1fd705a478e83a0ce7e54b2a1db36899b681bdd3e4300f88772c8c29a6073dcd24023b6974d7dba86eae19bf82daa410c5674737c44a0c
-
Filesize
50B
MD5a6216ef9fbe57b11deeb1b1fd840c392
SHA1e554348623ef9addde2fb3f2742d5cc1ef240ab1
SHA256edf6c9da71daf3b3da2e89a1bc6b9f4b812f18fc133cf4706a3ae983e4040946
SHA512af5fdd8419b8384361bbea7600b4da7860771dd974d3b2d747c6e1c4f7e4df49fe4be5fa2320e9041343c8d2ab5912be1cf279b61ed2a96954c1c2ed05aa0122
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
511KB
MD52f1aded5a3fee0631afaf2d2d1d5715b
SHA1fa63bbaed99a08e3fc570d471f560d060241d948
SHA256d2d985e309e4ab647712c03026053af2cce398f88e9453df7eea190d3c4fb596
SHA5124a08345ff9529709f1beeca10f2878f7be0a185a3a52a2b6194464850c1da7734bf174fc8e0585fe8a762b4430a68e6a6622c5d7bd2dbd374575da0c683c6095
-
Filesize
402B
MD552d77e755cdd905fe98c8300c244af91
SHA1ff9699e52085ceebb8c6443dea7764e351c080e7
SHA256ec36e666f59e94a0b9f762773fe8a0efb0ce0a10b6cee58fa4b48ff370f06d66
SHA5127b558fdd29653fb8fb20462b208a67f7ddabcb73e29ec8c550a0aee5885eb9bcd8c14c0867f6287ffdfa39279d2f5fa15599da9c4f625aa25556f73823ee1c2b
-
Filesize
691B
MD5eb823999f284fded77d8099f8808827f
SHA117c064d6424fa6ef8db9ae84de22d6a2b5fcd0d1
SHA2569789eef1cf06ef0c58f55c84fabed83a7adbb8dca2d7903659580338a8cc39a5
SHA512c852ece642a5d019c77654f63c772416a07ab0468280d1ff597ee571ca680b2a89e82b96e1154b1ac7da3eeea95eb75d9eb381cb04912d8cc93f4bb62d6a2a1e
-
C:\Users\Admin\hundredfold\optativs\Uncontainableness\Waneatta\vikingetid\Prevalent\tmmerhandler.pri
Filesize587KB
MD5a419b17919db68a326c7371d3c8e8b4a
SHA1662d1d5aa4ea08562c23f35df855652f5512eb3b
SHA256a9ed7d69860da9e6197338d570e3f0efb6e7d79102312924a7d52fcd2a496d5e
SHA51240aa74368582d51b840d4e7fc0c2ccd6b72a8fdd8b0cf7eca9efecbee62f6f5ece17d20994012d8c031396a096e937868a7b23be5a148d92ae634d559b08f2d6
-
Filesize
416KB
MD5e7eced2bed1ec9676dd95ce41aa04aa5
SHA183bcea69c7b03b26c67fc13bd7e0d1a941d3eef0
SHA256179ad988d40fc1bd891e6672704bc9f5b0e9f3ddf2a6e5af4cc2856e19906f23
SHA5125767103dd94b05ec9ff4d6db802b2ae83fbf708eace192922cbbb7f5928a932598a30a818687394c2ec8acaa2c3ecd0cc8435f42805f79661e5ea3e5891ed728
-
Filesize
444B
MD50633fd2a9c4a93c00580d86e53bd26d2
SHA1b8e982add99a937019f2ae2150ce133a5fa52bba
SHA2566a31c758ac6e348c10c2d57fc873097d6191036c7fe8e631a24f17edd0807255
SHA512f8434b1514f64978eeca055f2271f57329bf5983f82e78977a177cf38502319804b055820636b9a62588907622cfd7e88782834280c1221f8dbedc8ddcaa04b5