Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 00:18
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoice.pdf...exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
overdue invoice.pdf...exe
Resource
win10v2004-20220414-en
General
-
Target
overdue invoice.pdf...exe
-
Size
539KB
-
MD5
fa0c9ce3695691566ec8fbba088433c6
-
SHA1
1b5693cbe7521087c8bb5b46a8706edb71b037a4
-
SHA256
93c807a2fb8dff5a30d9f860f1eb98304d8303f8fff4c53c98870201d6d3eb68
-
SHA512
b3bb49000f13d18163d685905384b7acbca9b165cc009b53830c7f567b5c9f762fb6c6d1c08036db774265c1048d3e62b6ca198253a37a8a5a19adcffac4c57a
Malware Config
Extracted
Protocol: smtp- Host:
mail.matrixas.in - Port:
587 - Username:
[email protected] - Password:
info2013
Extracted
agenttesla
Protocol: smtp- Host:
mail.matrixas.in - Port:
587 - Username:
[email protected] - Password:
info2013
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4484-137-0x0000000000400000-0x000000000044A000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
overdue invoice.pdf...exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation overdue invoice.pdf...exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BAVLA = "C:\\Users\\Admin\\AppData\\Roaming\\BAVLA\\BAVLA.exe" overdue invoice.pdf...exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
overdue invoice.pdf...exedescription pid process target process PID 2632 set thread context of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
overdue invoice.pdf...exeoverdue invoice.pdf...exepid process 2632 overdue invoice.pdf...exe 4484 overdue invoice.pdf...exe 4484 overdue invoice.pdf...exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
overdue invoice.pdf...exeoverdue invoice.pdf...exedescription pid process Token: SeDebugPrivilege 2632 overdue invoice.pdf...exe Token: SeDebugPrivilege 4484 overdue invoice.pdf...exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
overdue invoice.pdf...exedescription pid process target process PID 2632 wrote to memory of 2824 2632 overdue invoice.pdf...exe schtasks.exe PID 2632 wrote to memory of 2824 2632 overdue invoice.pdf...exe schtasks.exe PID 2632 wrote to memory of 2824 2632 overdue invoice.pdf...exe schtasks.exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe PID 2632 wrote to memory of 4484 2632 overdue invoice.pdf...exe overdue invoice.pdf...exe -
outlook_office_path 1 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe -
outlook_win_path 1 IoCs
Processes:
overdue invoice.pdf...exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 overdue invoice.pdf...exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf...exe"C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf...exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zRCQEZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC66D.tmp"2⤵
- Creates scheduled task(s)
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\overdue invoice.pdf...exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4484
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
507B
MD576ffb2f33cb32ade8fc862a67599e9d8
SHA1920cc4ab75b36d2f9f6e979b74db568973c49130
SHA256f1a3724670e3379318ec9c73f6f39058cab0ab013ba3cd90c047c3d701362310
SHA512f33502c2e1bb30c05359bfc6819ca934642a1e01874e3060349127d792694d56ad22fccd6c9477b8ee50d66db35785779324273f509576b48b7f85577e001b4e
-
Filesize
1KB
MD56150ecbd348919a0a83b058339014590
SHA1b27a328394de96f0ad2f2638848a4f8fa0ccec92
SHA2561158ff6d200d748de3268d80e77a9f707fc44da65df9ce15576f4bb0ec9d2fbd
SHA51275a70e7eaf33d66ff1cdef570855ae238eaf3b08aa3470779ad782409f934cddf7270611abe4a3d1a764d4fd50cd35ffe5851a89853fb21a664d2f6a14bd93cc