Analysis
-
max time kernel
110s -
max time network
124s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
25-10-2021 12:40
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Oder.5645.scan.pdf....exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Purchase Oder.5645.scan.pdf....exe
Resource
win10-en-20210920
General
-
Target
Purchase Oder.5645.scan.pdf....exe
-
Size
822KB
-
MD5
4ffb74cefe453deaabfbeb37387eb44d
-
SHA1
373cc4f9481c544a96bbdc9c4bf040797fb79b07
-
SHA256
4f9d5e040e4c87f929fb4480abb54524347caa619d4e0f295a2a440c3426a273
-
SHA512
dc08472816f0896532ca29be901a4c58eeea8208b8544fa0d5ca802ae5faedc65105d4993d3c998d66356819197e31e552858ffa875ef3155919a1a285eab30f
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.szztsa.com - Port:
587 - Username:
[email protected] - Password:
Szzt@2019
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1644-117-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/1644-118-0x00000000004369CE-mapping.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Oder.5645.scan.pdf....exedescription pid process target process PID 2848 set thread context of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dw20.exepid process 1640 dw20.exe 1640 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 1640 dw20.exe Token: SeBackupPrivilege 1640 dw20.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
Purchase Oder.5645.scan.pdf....exePurchase Oder.5645.scan.pdf....exedescription pid process target process PID 2848 wrote to memory of 864 2848 Purchase Oder.5645.scan.pdf....exe schtasks.exe PID 2848 wrote to memory of 864 2848 Purchase Oder.5645.scan.pdf....exe schtasks.exe PID 2848 wrote to memory of 864 2848 Purchase Oder.5645.scan.pdf....exe schtasks.exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 2848 wrote to memory of 1644 2848 Purchase Oder.5645.scan.pdf....exe Purchase Oder.5645.scan.pdf....exe PID 1644 wrote to memory of 1640 1644 Purchase Oder.5645.scan.pdf....exe dw20.exe PID 1644 wrote to memory of 1640 1644 Purchase Oder.5645.scan.pdf....exe dw20.exe PID 1644 wrote to memory of 1640 1644 Purchase Oder.5645.scan.pdf....exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Oder.5645.scan.pdf....exe"C:\Users\Admin\AppData\Local\Temp\Purchase Oder.5645.scan.pdf....exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZQxlkmXJjlP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp40DD.tmp"2⤵
- Creates scheduled task(s)
PID:864
-
-
C:\Users\Admin\AppData\Local\Temp\Purchase Oder.5645.scan.pdf....exe"C:\Users\Admin\AppData\Local\Temp\Purchase Oder.5645.scan.pdf....exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 6963⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
ef140ef600b2463c9e7dbf064a104046
SHA1c08fd1853877be95575ea2e860dd8cafef31f54c
SHA256ad8ae97fdeb174b20f02c7ddf9466981856d77d51133599b5954f48f78a1b616
SHA512bf16df0994080bdc832cb39a312e0095de57608256fcf0d04d589e0bdf3283f918fb0d6ec86ea28a4b1af6db12813c52a724028f02330ebc3a9d32a4fcda706c