Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
DHL-#AWB130501923096.pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
DHL-#AWB130501923096.pdf.exe
Resource
win10
General
-
Target
DHL-#AWB130501923096.pdf.exe
-
Size
565KB
-
MD5
526a0c82c33a016f1ca7ba7389a2abfa
-
SHA1
21889035194e5184ec8ad24a4c7454a289457ac9
-
SHA256
fa1996ef1afee946b4386f49613daa9aae54eb4f04064d78d411843ae7a7fe43
-
SHA512
e40f2e56f162a91bb560fe25ecc0fae0b6e8e50483784b7d5049bd2efe4bff919226684684597c080ea1e791109479bf6dcf82fb3e34d5bc21f16ecee09a56ff
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1440 MSBuild.exe 1440 MSBuild.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Modifies service 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\LocalConfig netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\napagent\LocalConfig\Enroll\HcsGroups netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Shas netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\NapAgent\Qecs netsh.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\napagent\LocalConfig\UI netsh.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 616 wrote to memory of 1440 616 DHL-#AWB130501923096.pdf.exe 24 PID 1440 wrote to memory of 1620 1440 MSBuild.exe 28 PID 1440 wrote to memory of 1620 1440 MSBuild.exe 28 PID 1440 wrote to memory of 1620 1440 MSBuild.exe 28 PID 1440 wrote to memory of 1620 1440 MSBuild.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 616 set thread context of 1440 616 DHL-#AWB130501923096.pdf.exe 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1440 MSBuild.exe -
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL-#AWB130501923096.pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL-#AWB130501923096.pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:616 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
PID:1440 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵
- Modifies service
PID:1620
-
-