Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows10_x64 -
resource
win10 -
submitted
14-07-2020 13:24
Static task
static1
Behavioral task
behavioral1
Sample
packing list .pdf.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
packing list .pdf.exe
Resource
win10
General
-
Target
packing list .pdf.exe
-
Size
739KB
-
MD5
38128c21bb7c951f6916f29d641a3ffc
-
SHA1
ee05de47457938350639af461c138c801b54f5b3
-
SHA256
0d0aaa114bac9aa0afb33e6c70959524af7afa277e7700967763c604d4d188c2
-
SHA512
66ed56f43932bd1791e245e9671acfc8782f8999c98fe6d3e9ad44ca2b52daea977b42eb196b6f1c3644f8722671d6ee0b0f4b334f86b431e5ef3a23bb066ff7
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 3876 2460 packing list .pdf.exe 67 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3876 packing list .pdf.exe -
UPX packed file 3 IoCs
Detects executables packed with UPX/modified UPX open source packer.
resource yara_rule behavioral2/memory/3876-0-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/3876-2-0x0000000000400000-0x00000000004A4000-memory.dmp upx behavioral2/memory/3876-3-0x0000000000400000-0x00000000004A4000-memory.dmp upx -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2460 packing list .pdf.exe 2460 packing list .pdf.exe 3876 packing list .pdf.exe 3876 packing list .pdf.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3876 2460 packing list .pdf.exe 67 PID 2460 wrote to memory of 3876 2460 packing list .pdf.exe 67 PID 2460 wrote to memory of 3876 2460 packing list .pdf.exe 67 -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2460 packing list .pdf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
Processes
-
C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Suspicious behavior: MapViewOfSection
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"C:\Users\Admin\AppData\Local\Temp\packing list .pdf.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3876
-