Analysis
-
max time kernel
156s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
03-12-2021 15:57
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shipment Notification 1953341372.pdf.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
DHL Shipment Notification 1953341372.pdf.exe
Resource
win10-en-20211104
General
-
Target
DHL Shipment Notification 1953341372.pdf.exe
-
Size
468KB
-
MD5
621452b83a5cdf0a1e03ea6d3c56c595
-
SHA1
0710b1580784a673daeaef5aeb259f05df5aee1e
-
SHA256
8bd946b1e3dc26464602dfc0f7de0b2bb90637f4774213c7dcbea93dcc0e02fd
-
SHA512
ce9960e5b0c534186a547341130422e2f6c76983f5d03a0acb88447997c412aa3927c5b2b8725036ad10e393fe1895f2ac0972f35b8b712479d73f2e9f9830ab
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
negozio@depadova.cf - Password:
graceofgod@amen
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2548-135-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral2/memory/2548-136-0x000000000043760E-mapping.dmp family_agenttesla behavioral2/memory/2548-147-0x0000000005570000-0x0000000005A6E000-memory.dmp family_agenttesla -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
DHL Shipment Notification 1953341372.pdf.exedescription pid process target process PID 1272 set thread context of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exeRegSvcs.exepid process 4060 powershell.exe 2548 RegSvcs.exe 2548 RegSvcs.exe 4060 powershell.exe 4060 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 4060 powershell.exe Token: SeDebugPrivilege 2548 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
RegSvcs.exepid process 2548 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
DHL Shipment Notification 1953341372.pdf.exedescription pid process target process PID 1272 wrote to memory of 4060 1272 DHL Shipment Notification 1953341372.pdf.exe powershell.exe PID 1272 wrote to memory of 4060 1272 DHL Shipment Notification 1953341372.pdf.exe powershell.exe PID 1272 wrote to memory of 4060 1272 DHL Shipment Notification 1953341372.pdf.exe powershell.exe PID 1272 wrote to memory of 1552 1272 DHL Shipment Notification 1953341372.pdf.exe schtasks.exe PID 1272 wrote to memory of 1552 1272 DHL Shipment Notification 1953341372.pdf.exe schtasks.exe PID 1272 wrote to memory of 1552 1272 DHL Shipment Notification 1953341372.pdf.exe schtasks.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe PID 1272 wrote to memory of 2548 1272 DHL Shipment Notification 1953341372.pdf.exe RegSvcs.exe -
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 1953341372.pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 1953341372.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wKLJLmiJQVwUSn.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wKLJLmiJQVwUSn" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA871.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA871.tmpMD5
32c569842563bd09753357f992020abe
SHA1aa6d5cb079e602387fc1a6a0990b2aea4f1487ad
SHA2566778ba584f03c4edf3b949300d02420c20868d6b442dda5017eb111105d45f3d
SHA5121f91f8437595936bc98d2805d4f8fc7bad5a4c252e609fa9e8883025d0a4eb495106fddb290180af701499a322b487f11114afc44bad89db6b19ebf148f21c57
-
memory/1272-125-0x00000000055B0000-0x00000000055B1000-memory.dmpFilesize
4KB
-
memory/1272-127-0x0000000005FD0000-0x0000000006039000-memory.dmpFilesize
420KB
-
memory/1272-122-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/1272-123-0x0000000005100000-0x00000000055FE000-memory.dmpFilesize
5.0MB
-
memory/1272-124-0x00000000054D0000-0x00000000054D8000-memory.dmpFilesize
32KB
-
memory/1272-120-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/1272-126-0x0000000005F30000-0x0000000005F31000-memory.dmpFilesize
4KB
-
memory/1272-121-0x00000000051A0000-0x00000000051A1000-memory.dmpFilesize
4KB
-
memory/1272-118-0x00000000008A0000-0x00000000008A1000-memory.dmpFilesize
4KB
-
memory/1552-129-0x0000000000000000-mapping.dmp
-
memory/2548-147-0x0000000005570000-0x0000000005A6E000-memory.dmpFilesize
5.0MB
-
memory/2548-391-0x0000000005570000-0x0000000005A6E000-memory.dmpFilesize
5.0MB
-
memory/2548-135-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/2548-136-0x000000000043760E-mapping.dmp
-
memory/4060-140-0x00000000074F0000-0x00000000074F1000-memory.dmpFilesize
4KB
-
memory/4060-149-0x00000000085F0000-0x00000000085F1000-memory.dmpFilesize
4KB
-
memory/4060-133-0x0000000004A70000-0x0000000004A71000-memory.dmpFilesize
4KB
-
memory/4060-131-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/4060-141-0x0000000007E00000-0x0000000007E01000-memory.dmpFilesize
4KB
-
memory/4060-143-0x0000000007BE0000-0x0000000007BE1000-memory.dmpFilesize
4KB
-
memory/4060-144-0x0000000007E70000-0x0000000007E71000-memory.dmpFilesize
4KB
-
memory/4060-145-0x0000000006F00000-0x0000000006F01000-memory.dmpFilesize
4KB
-
memory/4060-146-0x0000000006F02000-0x0000000006F03000-memory.dmpFilesize
4KB
-
memory/4060-130-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/4060-148-0x0000000007D90000-0x0000000007D91000-memory.dmpFilesize
4KB
-
memory/4060-134-0x0000000007540000-0x0000000007541000-memory.dmpFilesize
4KB
-
memory/4060-150-0x0000000008550000-0x0000000008551000-memory.dmpFilesize
4KB
-
memory/4060-151-0x0000000003100000-0x0000000003101000-memory.dmpFilesize
4KB
-
memory/4060-158-0x0000000009310000-0x0000000009343000-memory.dmpFilesize
204KB
-
memory/4060-159-0x000000007E700000-0x000000007E701000-memory.dmpFilesize
4KB
-
memory/4060-166-0x00000000092F0000-0x00000000092F1000-memory.dmpFilesize
4KB
-
memory/4060-171-0x00000000096B0000-0x00000000096B1000-memory.dmpFilesize
4KB
-
memory/4060-172-0x0000000009840000-0x0000000009841000-memory.dmpFilesize
4KB
-
memory/4060-241-0x0000000006F03000-0x0000000006F04000-memory.dmpFilesize
4KB
-
memory/4060-128-0x0000000000000000-mapping.dmp