Analysis
-
max time kernel
124s -
max time network
51s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-05-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoice.pdf...exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
overdue invoice.pdf...exe
Resource
win10v2004-20220414-en
General
-
Target
overdue invoice.pdf...exe
-
Size
539KB
-
MD5
fa0c9ce3695691566ec8fbba088433c6
-
SHA1
1b5693cbe7521087c8bb5b46a8706edb71b037a4
-
SHA256
93c807a2fb8dff5a30d9f860f1eb98304d8303f8fff4c53c98870201d6d3eb68
-
SHA512
b3bb49000f13d18163d685905384b7acbca9b165cc009b53830c7f567b5c9f762fb6c6d1c08036db774265c1048d3e62b6ca198253a37a8a5a19adcffac4c57a
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.matrixas.in - Port:
587 - Username:
[email protected] - Password:
info2013
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1252-65-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/1252-63-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/1252-64-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/1252-66-0x0000000000445ECE-mapping.dmp family_agenttesla behavioral1/memory/1252-68-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla behavioral1/memory/1252-70-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\BAVLA = "C:\\Users\\Admin\\AppData\\Roaming\\BAVLA\\BAVLA.exe" overdue invoice.pdf...exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
overdue invoice.pdf...exedescription pid process target process PID 1528 set thread context of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
overdue invoice.pdf...exeoverdue invoice.pdf...exepid process 1528 overdue invoice.pdf...exe 1252 overdue invoice.pdf...exe 1252 overdue invoice.pdf...exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
overdue invoice.pdf...exeoverdue invoice.pdf...exedescription pid process Token: SeDebugPrivilege 1528 overdue invoice.pdf...exe Token: SeDebugPrivilege 1252 overdue invoice.pdf...exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
overdue invoice.pdf...exedescription pid process target process PID 1528 wrote to memory of 892 1528 overdue invoice.pdf...exe schtasks.exe PID 1528 wrote to memory of 892 1528 overdue invoice.pdf...exe schtasks.exe PID 1528 wrote to memory of 892 1528 overdue invoice.pdf...exe schtasks.exe PID 1528 wrote to memory of 892 1528 overdue invoice.pdf...exe schtasks.exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 1528 wrote to memory of 1252 1528 overdue invoice.pdf...exe overdue invoice.pdf...exe -
outlook_office_path 1 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe -
outlook_win_path 1 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf...exe"C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf...exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zRCQEZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB26F.tmp"2⤵
- Creates scheduled task(s)
PID:892 -
C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf...exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a5c664eb7931fca425aabe7fded65b5f
SHA12b5dd436b545dde6cc22f7b911f4c6efaa313b59
SHA256df22497993ee539e0e2f2ee4b0bee80f149f2ed85675bccd549ca5e9a523a117
SHA5129b37e6e9e96b51344b86234f1eac02d67528ca3015eb83ee1e785406a5225c7fc5184884a3cd2b21e9013823bf2207ad77b8ede87ab23608946b47390b77796d