Analysis
-
max time kernel
89s -
max time network
137s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 17:20
Static task
static1
Behavioral task
behavioral1
Sample
DHL-#AWB130501923096.pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
DHL-#AWB130501923096.pdf.exe
Resource
win10
General
-
Target
DHL-#AWB130501923096.pdf.exe
-
Size
565KB
-
MD5
526a0c82c33a016f1ca7ba7389a2abfa
-
SHA1
21889035194e5184ec8ad24a4c7454a289457ac9
-
SHA256
fa1996ef1afee946b4386f49613daa9aae54eb4f04064d78d411843ae7a7fe43
-
SHA512
e40f2e56f162a91bb560fe25ecc0fae0b6e8e50483784b7d5049bd2efe4bff919226684684597c080ea1e791109479bf6dcf82fb3e34d5bc21f16ecee09a56ff
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
faith12AB
Signatures
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3932 wrote to memory of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 PID 3900 wrote to memory of 812 3900 MSBuild.exe 74 PID 3900 wrote to memory of 812 3900 MSBuild.exe 74 PID 3900 wrote to memory of 812 3900 MSBuild.exe 74 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3932 set thread context of 3900 3932 DHL-#AWB130501923096.pdf.exe 67 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3900 MSBuild.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3900 MSBuild.exe 3900 MSBuild.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL-#AWB130501923096.pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL-#AWB130501923096.pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:3932 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3900 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile3⤵PID:812
-
-