Analysis
-
max time kernel
109s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-05-2022 22:18
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoice.pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
overdue invoice.pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
overdue invoice.pdf.exe
-
Size
1.3MB
-
MD5
dc5f5ae953f37c7f54a3d787fc2353ca
-
SHA1
75de209d727492f675faec351f728c2b9d09b565
-
SHA256
ab5f254a91426311df7fe85d3442b62c7b69dd1c6e444ef725ddcba5a06ac961
-
SHA512
32c651b7e91fd467616ab5391e4e4e51d343c4d91da4afbf8a8f63d5db2d3f60bca6cf3d77d88daa15da8cbdd7a9dccc7ab3766d859472ed7ca9e4b9ce9decd3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.matrixas.in - Port:
587 - Username:
[email protected] - Password:
info2013
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1640-132-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
Processes:
overdue invoice.pdf.exedescription pid process target process PID 4476 set thread context of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
dw20.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeBackupPrivilege 2356 dw20.exe Token: SeBackupPrivilege 2356 dw20.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
overdue invoice.pdf.exeRegSvcs.exedescription pid process target process PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 4476 wrote to memory of 1640 4476 overdue invoice.pdf.exe RegSvcs.exe PID 1640 wrote to memory of 2356 1640 RegSvcs.exe dw20.exe PID 1640 wrote to memory of 2356 1640 RegSvcs.exe dw20.exe PID 1640 wrote to memory of 2356 1640 RegSvcs.exe dw20.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf.exe"C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegSvcs.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 7763⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:2356