Analysis
-
max time kernel
65s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
08/09/2022, 19:15
Static task
static1
Behavioral task
behavioral1
Sample
IMG Ajánlatkérés RBT MFG.pdf(48KB).exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
IMG Ajánlatkérés RBT MFG.pdf(48KB).exe
Resource
win10v2004-20220901-en
General
-
Target
IMG Ajánlatkérés RBT MFG.pdf(48KB).exe
-
Size
177KB
-
MD5
c1ede307aa869da7eb1e29b89e448ec8
-
SHA1
fae816111cee6b6ae9f713707d433ba40c3b0f48
-
SHA256
47a4d52d3687076b619a6b7fd7327c3d516ee5a54037154b347020af88f361de
-
SHA512
e3660a0b1b406b49c896c689bd6237aab05cd22fe8b78b8c81ec198c99a31e7a451599d63b036c27d0ed40658915774eacb5d1b5e3808aadb6b636a72c4221b0
-
SSDEEP
3072:DxXpafQp1KIHTYoVzmvTZdJY9dcyToCeyFyYHUqZqcKStrfXAlBym:Dxcop11HUoVmLZdJs2yTopwyYHLZDKM0
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
%2B - Port:
21 - Username:
application/x-www-form-urlencoded - Password:
image/jpg
p=
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 784 set thread context of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1992 cvtres.exe 1992 cvtres.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1992 cvtres.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 PID 784 wrote to memory of 1992 784 IMG Ajánlatkérés RBT MFG.pdf(48KB).exe 26 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cvtres.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\IMG Ajánlatkérés RBT MFG.pdf(48KB).exe"C:\Users\Admin\AppData\Local\Temp\IMG Ajánlatkérés RBT MFG.pdf(48KB).exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1992
-