Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 07:17
Static task
static1
Behavioral task
behavioral1
Sample
DHL AWB #7849402748,pdf.exe
Resource
win7
Behavioral task
behavioral2
Sample
DHL AWB #7849402748,pdf.exe
Resource
win10
General
-
Target
DHL AWB #7849402748,pdf.exe
-
Size
5.6MB
-
MD5
9a099cecae30cc98f819f1724c2f2a82
-
SHA1
e4c1308358cf300d092d2d0a9927180890ec951f
-
SHA256
b0b358f5e0f4bfb12abe5066a9083f881c3b9c501029d9ce45416d36eb2e866c
-
SHA512
caa53a4c53ee9645a29a11d4c37a7af9fa4e456a49581d4616c8520f0fe2db9c5c66e2353ced397c322c3bdf4a284981f49b17601bea27e2345b567b8774a0d7
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1564-14-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla behavioral1/memory/1564-15-0x000000000044CC3E-mapping.dmp family_agenttesla behavioral1/memory/1564-17-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla behavioral1/memory/1564-18-0x0000000000400000-0x0000000000452000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts AddInProcess32.exe -
Executes dropped EXE 2 IoCs
pid Process 1104 ncnc.exe 1564 AddInProcess32.exe -
Loads dropped DLL 2 IoCs
pid Process 1124 DHL AWB #7849402748,pdf.exe 1104 ncnc.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\nbbb = "C:\\Windows\\system32\\pcalua.exe -a C:\\Users\\Admin\\AppData\\Roaming\\ncnc.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1104 set thread context of 1564 1104 ncnc.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1124 DHL AWB #7849402748,pdf.exe 1124 DHL AWB #7849402748,pdf.exe 1124 DHL AWB #7849402748,pdf.exe 1104 ncnc.exe 1104 ncnc.exe 1104 ncnc.exe 1564 AddInProcess32.exe 1564 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1124 DHL AWB #7849402748,pdf.exe Token: SeDebugPrivilege 1104 ncnc.exe Token: SeDebugPrivilege 1564 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1124 wrote to memory of 1424 1124 DHL AWB #7849402748,pdf.exe 24 PID 1124 wrote to memory of 1424 1124 DHL AWB #7849402748,pdf.exe 24 PID 1124 wrote to memory of 1424 1124 DHL AWB #7849402748,pdf.exe 24 PID 1124 wrote to memory of 1424 1124 DHL AWB #7849402748,pdf.exe 24 PID 1424 wrote to memory of 1520 1424 cmd.exe 26 PID 1424 wrote to memory of 1520 1424 cmd.exe 26 PID 1424 wrote to memory of 1520 1424 cmd.exe 26 PID 1424 wrote to memory of 1520 1424 cmd.exe 26 PID 1124 wrote to memory of 1104 1124 DHL AWB #7849402748,pdf.exe 27 PID 1124 wrote to memory of 1104 1124 DHL AWB #7849402748,pdf.exe 27 PID 1124 wrote to memory of 1104 1124 DHL AWB #7849402748,pdf.exe 27 PID 1124 wrote to memory of 1104 1124 DHL AWB #7849402748,pdf.exe 27 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1104 wrote to memory of 1564 1104 ncnc.exe 30 PID 1564 wrote to memory of 1040 1564 AddInProcess32.exe 32 PID 1564 wrote to memory of 1040 1564 AddInProcess32.exe 32 PID 1564 wrote to memory of 1040 1564 AddInProcess32.exe 32 PID 1564 wrote to memory of 1040 1564 AddInProcess32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL AWB #7849402748,pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL AWB #7849402748,pdf.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v nbbb /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\ncnc.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v nbbb /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\ncnc.exe"3⤵
- Adds Run key to start application
PID:1520
-
-
-
C:\Users\Admin\AppData\Roaming\ncnc.exe"C:\Users\Admin\AppData\Roaming\ncnc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\netsh.exe"netsh" wlan show profile4⤵PID:1040
-
-
-