Analysis
-
max time kernel
43s -
max time network
52s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
14-07-2020 13:24
Static task
static1
Behavioral task
behavioral1
Sample
packing list .pdf.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
packing list .pdf.exe
Resource
win10
General
-
Target
packing list .pdf.exe
-
Size
739KB
-
MD5
38128c21bb7c951f6916f29d641a3ffc
-
SHA1
ee05de47457938350639af461c138c801b54f5b3
-
SHA256
0d0aaa114bac9aa0afb33e6c70959524af7afa277e7700967763c604d4d188c2
-
SHA512
66ed56f43932bd1791e245e9671acfc8782f8999c98fe6d3e9ad44ca2b52daea977b42eb196b6f1c3644f8722671d6ee0b0f4b334f86b431e5ef3a23bb066ff7
Malware Config
Signatures
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 752 packing list .pdf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 804 packing list .pdf.exe 752 packing list .pdf.exe 752 packing list .pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 804 set thread context of 752 804 packing list .pdf.exe 24 -
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
resource yara_rule behavioral1/memory/752-0-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/752-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral1/memory/752-3-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 804 wrote to memory of 752 804 packing list .pdf.exe 24 PID 804 wrote to memory of 752 804 packing list .pdf.exe 24 PID 804 wrote to memory of 752 804 packing list .pdf.exe 24 PID 804 wrote to memory of 752 804 packing list .pdf.exe 24 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 804 packing list .pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:804 -
C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:752
-