Analysis
-
max time kernel
88s -
max time network
116s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 13:24
Static task
static1
Behavioral task
behavioral1
Sample
documents.pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
documents.pdf.exe
Resource
win10
General
-
Target
documents.pdf.exe
-
Size
475KB
-
MD5
a99bef1b35e748c7f914b6020e45a26a
-
SHA1
127ea995117e17b0253b0e193b04ad7310a4ac54
-
SHA256
86199dfe35e6b54df16a4ffae4e58d3acd8bab4e821e5f286ed799df406f0e75
-
SHA512
81af90ed8f5ea87c2d8b476b0fe29388913c5d0ef7ddc927610677b00514514b3fe2c788b712d8bf8c9593c97cc02563e08b828a22bdd1e44c44e0caac9dd56a
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Signatures
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2728 documents.pdf.exe Token: SeDebugPrivilege 3928 documents.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2728 set thread context of 3928 2728 documents.pdf.exe 68 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3928 documents.pdf.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2728 wrote to memory of 3880 2728 documents.pdf.exe 67 PID 2728 wrote to memory of 3880 2728 documents.pdf.exe 67 PID 2728 wrote to memory of 3880 2728 documents.pdf.exe 67 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 PID 2728 wrote to memory of 3928 2728 documents.pdf.exe 68 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2728 documents.pdf.exe 2728 documents.pdf.exe 3928 documents.pdf.exe 3928 documents.pdf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\documents.pdf.exe"C:\Users\Admin\AppData\Local\Temp\documents.pdf.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\documents.pdf.exe"{path}"2⤵PID:3880
-
-
C:\Users\Admin\AppData\Local\Temp\documents.pdf.exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
PID:3928
-