Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
comprobante.pdf.exe
Resource
win7-20221111-en
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
comprobante.pdf.exe
Resource
win10v2004-20221111-en
9 signatures
150 seconds
General
-
Target
comprobante.pdf.exe
-
Size
42KB
-
MD5
37dffb8fc4927092f3e166aee2afa828
-
SHA1
13f38874c91e6186afdb694c896cf029d3875824
-
SHA256
181232a9e88c12ab1b1ec7228c1a9f4703b44017fac6934a142361e37985ff15
-
SHA512
ada8050509e45d104fb5414bc3970655701bbe85212aea01086cd95d6a127234ef0eab26c0891280586b72fc66fc9095b7ad33f988fc6f78d8acaa6032187e07
-
SSDEEP
768:hev5NGja1TxGIP+tZS+XZg/0kt+Hrqt5RYVMcORgU24vSyiRj:MNG21T4IP+tZPX2MM+LqtfY9ORGhyi5
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: ftp- Host:
ftp://ftp.sisoempresarialsas.com - Port:
21 - Username:
[email protected] - Password:
.!LV?]FKWxUy
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1224 set thread context of 3704 1224 comprobante.pdf.exe 104 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe 1224 comprobante.pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1224 comprobante.pdf.exe Token: SeDebugPrivilege 3704 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1224 wrote to memory of 364 1224 comprobante.pdf.exe 82 PID 1224 wrote to memory of 364 1224 comprobante.pdf.exe 82 PID 1224 wrote to memory of 4752 1224 comprobante.pdf.exe 83 PID 1224 wrote to memory of 4752 1224 comprobante.pdf.exe 83 PID 1224 wrote to memory of 4776 1224 comprobante.pdf.exe 84 PID 1224 wrote to memory of 4776 1224 comprobante.pdf.exe 84 PID 1224 wrote to memory of 3392 1224 comprobante.pdf.exe 85 PID 1224 wrote to memory of 3392 1224 comprobante.pdf.exe 85 PID 1224 wrote to memory of 1516 1224 comprobante.pdf.exe 86 PID 1224 wrote to memory of 1516 1224 comprobante.pdf.exe 86 PID 1224 wrote to memory of 2544 1224 comprobante.pdf.exe 87 PID 1224 wrote to memory of 2544 1224 comprobante.pdf.exe 87 PID 1224 wrote to memory of 1460 1224 comprobante.pdf.exe 88 PID 1224 wrote to memory of 1460 1224 comprobante.pdf.exe 88 PID 1224 wrote to memory of 2000 1224 comprobante.pdf.exe 89 PID 1224 wrote to memory of 2000 1224 comprobante.pdf.exe 89 PID 1224 wrote to memory of 3968 1224 comprobante.pdf.exe 90 PID 1224 wrote to memory of 3968 1224 comprobante.pdf.exe 90 PID 1224 wrote to memory of 1764 1224 comprobante.pdf.exe 91 PID 1224 wrote to memory of 1764 1224 comprobante.pdf.exe 91 PID 1224 wrote to memory of 2276 1224 comprobante.pdf.exe 92 PID 1224 wrote to memory of 2276 1224 comprobante.pdf.exe 92 PID 1224 wrote to memory of 1608 1224 comprobante.pdf.exe 93 PID 1224 wrote to memory of 1608 1224 comprobante.pdf.exe 93 PID 1224 wrote to memory of 4460 1224 comprobante.pdf.exe 94 PID 1224 wrote to memory of 4460 1224 comprobante.pdf.exe 94 PID 1224 wrote to memory of 3148 1224 comprobante.pdf.exe 95 PID 1224 wrote to memory of 3148 1224 comprobante.pdf.exe 95 PID 1224 wrote to memory of 2672 1224 comprobante.pdf.exe 96 PID 1224 wrote to memory of 2672 1224 comprobante.pdf.exe 96 PID 1224 wrote to memory of 4668 1224 comprobante.pdf.exe 97 PID 1224 wrote to memory of 4668 1224 comprobante.pdf.exe 97 PID 1224 wrote to memory of 2696 1224 comprobante.pdf.exe 98 PID 1224 wrote to memory of 2696 1224 comprobante.pdf.exe 98 PID 1224 wrote to memory of 1504 1224 comprobante.pdf.exe 99 PID 1224 wrote to memory of 1504 1224 comprobante.pdf.exe 99 PID 1224 wrote to memory of 2812 1224 comprobante.pdf.exe 100 PID 1224 wrote to memory of 2812 1224 comprobante.pdf.exe 100 PID 1224 wrote to memory of 2920 1224 comprobante.pdf.exe 101 PID 1224 wrote to memory of 2920 1224 comprobante.pdf.exe 101 PID 1224 wrote to memory of 1528 1224 comprobante.pdf.exe 102 PID 1224 wrote to memory of 1528 1224 comprobante.pdf.exe 102 PID 1224 wrote to memory of 1272 1224 comprobante.pdf.exe 103 PID 1224 wrote to memory of 1272 1224 comprobante.pdf.exe 103 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 PID 1224 wrote to memory of 3704 1224 comprobante.pdf.exe 104 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\comprobante.pdf.exe"C:\Users\Admin\AppData\Local\Temp\comprobante.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:364
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:4752
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"2⤵PID:4776
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:3392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:1516
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:2544
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:1460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:2000
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:3968
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:1764
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:2276
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:1608
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:4460
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:3148
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:2672
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:4668
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"2⤵PID:2696
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:1504
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:2812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:2920
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:1528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:1272
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3704
-