Analysis

  • max time kernel
    66s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 17:26

General

  • Target

    Cotización-202002721.pdf.exe

  • Size

    473KB

  • MD5

    bf2d6295a7e04f44e50101fd3df6b34f

  • SHA1

    223321e3e18c453875f4d625b1327b8a8e05de1a

  • SHA256

    c5b618054d855fffed65dc372080cdc5de39ca31edd513e7765a02c64f9b9e1b

  • SHA512

    fcec0b125961d7ae9f1672e85e61ff0c58a0aa58a3a0686816c32be0581352c08a7a46b16bbe9073f640d26e81b1cd7a0791aa5ea44380b2defb5342db2f79e6

  • SSDEEP

    12288:943FAhu8y7mMaBXkiB/ZrLX/qFiyDwHi220AbWxQhi:e3FSunDuXBX62gvs

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.itzayanaland.com
  • Port:
    587
  • Username:
    security01@itzayanaland.com
  • Password:
    H!S6_PFHTAN{
  • Email To:
    security01@itzayanaland.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Cotización-202002721.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\Cotización-202002721.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3888
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"
      2⤵
        PID:2192
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe
        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"
        2⤵
          PID:3924
        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"
          2⤵
            PID:4404
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"
            2⤵
              PID:552
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"
              2⤵
                PID:1416
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"
                2⤵
                  PID:3700
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"
                  2⤵
                    PID:4112
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe
                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"
                    2⤵
                      PID:2264
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"
                      2⤵
                        PID:5104
                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe
                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"
                        2⤵
                          PID:3376
                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe
                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"
                          2⤵
                            PID:4316
                          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe
                            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"
                            2⤵
                              PID:4324
                            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"
                              2⤵
                                PID:4328
                              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe
                                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"
                                2⤵
                                  PID:4344
                                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe
                                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"
                                  2⤵
                                    PID:5096
                                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe
                                    "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"
                                    2⤵
                                      PID:4376
                                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
                                      2⤵
                                        PID:1888
                                      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe
                                        "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"
                                        2⤵
                                          PID:1292
                                        • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe
                                          "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"
                                          2⤵
                                          • Accesses Microsoft Outlook profiles
                                          • Suspicious use of AdjustPrivilegeToken
                                          • outlook_office_path
                                          • outlook_win_path
                                          PID:4164

                                      Network

                                      MITRE ATT&CK Matrix ATT&CK v6

                                      Collection

                                      Email Collection

                                      1
                                      T1114

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • memory/3888-133-0x000002AF128E0000-0x000002AF1295C000-memory.dmp
                                        Filesize

                                        496KB

                                      • memory/3888-134-0x000002AF14770000-0x000002AF14780000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/4164-135-0x0000000000400000-0x0000000000430000-memory.dmp
                                        Filesize

                                        192KB

                                      • memory/4164-137-0x00000000055A0000-0x0000000005B44000-memory.dmp
                                        Filesize

                                        5.6MB

                                      • memory/4164-138-0x0000000004FF0000-0x0000000005056000-memory.dmp
                                        Filesize

                                        408KB

                                      • memory/4164-139-0x00000000051C0000-0x00000000051D0000-memory.dmp
                                        Filesize

                                        64KB

                                      • memory/4164-140-0x0000000006140000-0x00000000061D2000-memory.dmp
                                        Filesize

                                        584KB

                                      • memory/4164-141-0x0000000006120000-0x000000000612A000-memory.dmp
                                        Filesize

                                        40KB

                                      • memory/4164-142-0x00000000063C0000-0x0000000006410000-memory.dmp
                                        Filesize

                                        320KB

                                      • memory/4164-143-0x00000000065E0000-0x00000000067A2000-memory.dmp
                                        Filesize

                                        1.8MB

                                      • memory/4164-144-0x00000000051C0000-0x00000000051D0000-memory.dmp
                                        Filesize

                                        64KB