Analysis
-
max time kernel
164s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2022 20:27
Static task
static1
Behavioral task
behavioral1
Sample
SH-765433_pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
SH-765433_pdf.exe
Resource
win10v2004-20221111-en
General
-
Target
SH-765433_pdf.exe
-
Size
347KB
-
MD5
971b0cc850794850607ece60e62da848
-
SHA1
e717ebba195c641533dc4cd704fb59b001804a97
-
SHA256
8ccbf1ed960f1c8d93be2abbb9b7228a156c64b82ad258458e596226aaf6c95c
-
SHA512
960faa4b0b90afe5c6b44ebeb2a83c6702c643ef4ebfc5802bc344d96bd456d314a63fa3a4aa786b4e3dc04523c0a7a2dc6636d05e6f986d1d10e0964a359386
-
SSDEEP
6144:9kwI5mH2y25AOzOGP4d4ndG/UXkR6Z3+6xeZPgw9ceD2bSDs:U5N3zOGQh/UXkRi+sAFceEss
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 3 IoCs
Processes:
jmpssjbye.exejmpssjbye.exejmpssjbye.exepid process 4316 jmpssjbye.exe 2468 jmpssjbye.exe 1496 jmpssjbye.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
jmpssjbye.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jmpssjbye.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jmpssjbye.exe Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jmpssjbye.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
jmpssjbye.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Skype = "C:\\Users\\Admin\\AppData\\Roaming\\Skype\\Skype.exe" jmpssjbye.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 91 api.ipify.org 92 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
jmpssjbye.exedescription pid process target process PID 4316 set thread context of 1496 4316 jmpssjbye.exe jmpssjbye.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
jmpssjbye.exepid process 1496 jmpssjbye.exe 1496 jmpssjbye.exe 1496 jmpssjbye.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
jmpssjbye.exepid process 4316 jmpssjbye.exe 4316 jmpssjbye.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
jmpssjbye.exedescription pid process Token: SeDebugPrivilege 1496 jmpssjbye.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
jmpssjbye.exepid process 1496 jmpssjbye.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
SH-765433_pdf.exejmpssjbye.exedescription pid process target process PID 4552 wrote to memory of 4316 4552 SH-765433_pdf.exe jmpssjbye.exe PID 4552 wrote to memory of 4316 4552 SH-765433_pdf.exe jmpssjbye.exe PID 4552 wrote to memory of 4316 4552 SH-765433_pdf.exe jmpssjbye.exe PID 4316 wrote to memory of 2468 4316 jmpssjbye.exe jmpssjbye.exe PID 4316 wrote to memory of 2468 4316 jmpssjbye.exe jmpssjbye.exe PID 4316 wrote to memory of 2468 4316 jmpssjbye.exe jmpssjbye.exe PID 4316 wrote to memory of 1496 4316 jmpssjbye.exe jmpssjbye.exe PID 4316 wrote to memory of 1496 4316 jmpssjbye.exe jmpssjbye.exe PID 4316 wrote to memory of 1496 4316 jmpssjbye.exe jmpssjbye.exe PID 4316 wrote to memory of 1496 4316 jmpssjbye.exe jmpssjbye.exe -
outlook_office_path 1 IoCs
Processes:
jmpssjbye.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jmpssjbye.exe -
outlook_win_path 1 IoCs
Processes:
jmpssjbye.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jmpssjbye.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SH-765433_pdf.exe"C:\Users\Admin\AppData\Local\Temp\SH-765433_pdf.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\jmpssjbye.exe"C:\Users\Admin\AppData\Local\Temp\jmpssjbye.exe" C:\Users\Admin\AppData\Local\Temp\ehwcr.fk2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\jmpssjbye.exe"C:\Users\Admin\AppData\Local\Temp\jmpssjbye.exe"3⤵
- Executes dropped EXE
PID:2468
-
-
C:\Users\Admin\AppData\Local\Temp\jmpssjbye.exe"C:\Users\Admin\AppData\Local\Temp\jmpssjbye.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1496
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD568cd911df4d68d584ca4282788a95530
SHA1fc91c5c57dbb5abe9c4a18e482ec74e962090c53
SHA25675f41703a00ae3744d1dc21df418ef5f79ac14dd3d46d5ce245d05b9645aa1ff
SHA512bb583fb4b9336ca8dc1cc4b73e71638d2ae5b6e088ff183b171c4bcc8ae90036ab60958e87fd61c5f8dbe71862f8c52b3eb35086b6a21b4be9f024ab2dea6bf2
-
Filesize
241KB
MD533c122f63413881e4335231f56fa056e
SHA1af6700cd2a6a26cf13f837d89d95de826dc5c67d
SHA256b4865e6a67d14d4701185930eb002a08ac193f21f45ffd6980a15b9e4bfc98dd
SHA5121477d017bb498c7830d1971eac2a44c370c42e470e9079e96c9c74939b72faddca4cf05a83460a76d42b9bf67afbef62a76b0098271b0df8c1a5f6576a14a7ba
-
Filesize
287KB
MD58acbb590c8f9e3359d423579ad62e46c
SHA1151c4b9f98212953a1602a93eee4c8fea69ee757
SHA2569cb977a24715b4131f88116c28e1bd2a4e890ee211ff67abd1e252b890aa0d93
SHA51278bef162ee89bce5467f87ea7a3f728c364d35eb0a191d744e40c58a122eecd26a5d5cecd68f5f3660ada0a549a506bd9f8bc95c1d81ece6b679395f67e92cf8
-
Filesize
287KB
MD58acbb590c8f9e3359d423579ad62e46c
SHA1151c4b9f98212953a1602a93eee4c8fea69ee757
SHA2569cb977a24715b4131f88116c28e1bd2a4e890ee211ff67abd1e252b890aa0d93
SHA51278bef162ee89bce5467f87ea7a3f728c364d35eb0a191d744e40c58a122eecd26a5d5cecd68f5f3660ada0a549a506bd9f8bc95c1d81ece6b679395f67e92cf8
-
Filesize
287KB
MD58acbb590c8f9e3359d423579ad62e46c
SHA1151c4b9f98212953a1602a93eee4c8fea69ee757
SHA2569cb977a24715b4131f88116c28e1bd2a4e890ee211ff67abd1e252b890aa0d93
SHA51278bef162ee89bce5467f87ea7a3f728c364d35eb0a191d744e40c58a122eecd26a5d5cecd68f5f3660ada0a549a506bd9f8bc95c1d81ece6b679395f67e92cf8
-
Filesize
287KB
MD58acbb590c8f9e3359d423579ad62e46c
SHA1151c4b9f98212953a1602a93eee4c8fea69ee757
SHA2569cb977a24715b4131f88116c28e1bd2a4e890ee211ff67abd1e252b890aa0d93
SHA51278bef162ee89bce5467f87ea7a3f728c364d35eb0a191d744e40c58a122eecd26a5d5cecd68f5f3660ada0a549a506bd9f8bc95c1d81ece6b679395f67e92cf8