Analysis
-
max time kernel
121s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 03:22
Static task
static1
Behavioral task
behavioral1
Sample
DHL_AWB #1008936572891_pdf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
DHL_AWB #1008936572891_pdf.exe
Resource
win10v2004-20220414-en
General
-
Target
DHL_AWB #1008936572891_pdf.exe
-
Size
2.1MB
-
MD5
3e910208a9f1bf03108895af8671078c
-
SHA1
6b59a64f11e6559c1354c8097856593469ecd8bc
-
SHA256
885179565290381c8e8e883f1e4c776507c1ddd3bfa8902f432ea31fbf01c683
-
SHA512
525ee64a0e0915fa5f35534187c230d3526395ebb42d7c0c68123b9804158d66d0078821c0e7f7a1bf7554322fa28a47d73a6422a7e451fd7dac3062b43dffeb
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
MassLogger
Masslogger is a .NET stealer targeting passwords from browsers, email and cryptocurrency clients.
-
MassLogger Main Payload 4 IoCs
resource yara_rule behavioral2/memory/4776-130-0x0000000000BB0000-0x0000000000DC4000-memory.dmp family_masslogger behavioral2/files/0x0006000000022e43-136.dat family_masslogger behavioral2/files/0x0006000000022e43-137.dat family_masslogger behavioral2/memory/772-138-0x0000000000480000-0x0000000000538000-memory.dmp family_masslogger -
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/memory/4776-130-0x0000000000BB0000-0x0000000000DC4000-memory.dmp family_agenttesla behavioral2/memory/1904-142-0x0000000000400000-0x000000000045A000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 772 MassLoggerBinUPDATEProizvodnja.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Control Panel\International\Geo\Nation DHL_AWB #1008936572891_pdf.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe DHL_AWB #1008936572891_pdf.exe -
Loads dropped DLL 1 IoCs
pid Process 4776 DHL_AWB #1008936572891_pdf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL_AWB #1008936572891_pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL_AWB #1008936572891_pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL_AWB #1008936572891_pdf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WEqfDb = "C:\\Users\\Admin\\AppData\\Roaming\\WEqfDb\\WEqfDb.exe" DHL_AWB #1008936572891_pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4776 set thread context of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4776 DHL_AWB #1008936572891_pdf.exe 772 MassLoggerBinUPDATEProizvodnja.exe 772 MassLoggerBinUPDATEProizvodnja.exe 4776 DHL_AWB #1008936572891_pdf.exe 4776 DHL_AWB #1008936572891_pdf.exe 1876 powershell.exe 1876 powershell.exe 1904 DHL_AWB #1008936572891_pdf.exe 1904 DHL_AWB #1008936572891_pdf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4776 DHL_AWB #1008936572891_pdf.exe Token: SeDebugPrivilege 772 MassLoggerBinUPDATEProizvodnja.exe Token: SeDebugPrivilege 1876 powershell.exe Token: SeDebugPrivilege 1904 DHL_AWB #1008936572891_pdf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 4776 wrote to memory of 772 4776 DHL_AWB #1008936572891_pdf.exe 83 PID 4776 wrote to memory of 772 4776 DHL_AWB #1008936572891_pdf.exe 83 PID 4776 wrote to memory of 772 4776 DHL_AWB #1008936572891_pdf.exe 83 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 4776 wrote to memory of 1904 4776 DHL_AWB #1008936572891_pdf.exe 90 PID 772 wrote to memory of 4496 772 MassLoggerBinUPDATEProizvodnja.exe 91 PID 772 wrote to memory of 4496 772 MassLoggerBinUPDATEProizvodnja.exe 91 PID 772 wrote to memory of 4496 772 MassLoggerBinUPDATEProizvodnja.exe 91 PID 4496 wrote to memory of 1876 4496 cmd.exe 93 PID 4496 wrote to memory of 1876 4496 cmd.exe 93 PID 4496 wrote to memory of 1876 4496 cmd.exe 93 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL_AWB #1008936572891_pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 DHL_AWB #1008936572891_pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL_AWB #1008936572891_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL_AWB #1008936572891_pdf.exe"1⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c start /b powershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell Start-Sleep -Seconds 2; Remove-Item -path 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DHL_AWB #1008936572891_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL_AWB #1008936572891_pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1904
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD514ff402962ad21b78ae0b4c43cd1f194
SHA1f8a510eb26666e875a5bdd1cadad40602763ad72
SHA256fb9646cb956945bdc503e69645f6b5316d3826b780d3c36738d6b944e884d15b
SHA512daa7a08bf3709119a944bce28f6ebdd24e54a22b18cd9f86a87873e958df121a3881dcdd5e162f6b4e543238c7aef20f657c9830df01d4c79290f7c9a4fcc54b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe
Filesize711KB
MD58bc40219a7641c3bcf72228173552977
SHA1ccd09865e9c7adc458a85b7638b7cd3e6a843d83
SHA2569e4cce1b23e7fdec9ab35c03326a7d3990aef52b7a5bce0d47d28bf8e56cfd6e
SHA512d6273cd78443faac11ddfe3dbfe3731d0243cd2454227153c71593ad826df4c62d3488da29dc7a527ec5977c54e02d091eec43803f20832de518b9f3069c396e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\MassLoggerBinUPDATEProizvodnja.exe
Filesize711KB
MD58bc40219a7641c3bcf72228173552977
SHA1ccd09865e9c7adc458a85b7638b7cd3e6a843d83
SHA2569e4cce1b23e7fdec9ab35c03326a7d3990aef52b7a5bce0d47d28bf8e56cfd6e
SHA512d6273cd78443faac11ddfe3dbfe3731d0243cd2454227153c71593ad826df4c62d3488da29dc7a527ec5977c54e02d091eec43803f20832de518b9f3069c396e