Analysis
-
max time kernel
143s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
24-05-2023 13:15
Static task
static1
Behavioral task
behavioral1
Sample
Slip Copy 240523.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Slip Copy 240523.pdf.exe
Resource
win10v2004-20230220-en
General
-
Target
Slip Copy 240523.pdf.exe
-
Size
267KB
-
MD5
6297bc5b7763b64046b110797702d183
-
SHA1
5ae9d0c1415a005c32494f8c5c74cfc085c91241
-
SHA256
08d5c55d4e5f9a25da2e69af35d5c9d0c09f5f261f7eef4dc56d605b6361dd67
-
SHA512
42c5e9fcf8a9704e8c4d94849e98c010142870b1428df7b1a84c39da5a723fd0aa3967a83245195c69b2095bd77c95ec0181ee13a673b387e5bbb71bf4b55cfd
-
SSDEEP
6144:/Ya603LbTdjNcsWjnra5G3I+Tmdjw4DLi6A5Pg:/YK7Poln+E3IGmdbiD5Pg
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 1 IoCs
pid Process 5112 Slip Copy 240523.pdf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Slip Copy 240523.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Slip Copy 240523.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Slip Copy 240523.pdf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\FygVDYr = "C:\\Users\\Admin\\AppData\\Roaming\\FygVDYr\\FygVDYr.exe" Slip Copy 240523.pdf.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 28 api.ipify.org 29 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5112 set thread context of 792 5112 Slip Copy 240523.pdf.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 792 Slip Copy 240523.pdf.exe 792 Slip Copy 240523.pdf.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 5112 Slip Copy 240523.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 Slip Copy 240523.pdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 792 Slip Copy 240523.pdf.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 5112 wrote to memory of 792 5112 Slip Copy 240523.pdf.exe 86 PID 5112 wrote to memory of 792 5112 Slip Copy 240523.pdf.exe 86 PID 5112 wrote to memory of 792 5112 Slip Copy 240523.pdf.exe 86 PID 5112 wrote to memory of 792 5112 Slip Copy 240523.pdf.exe 86 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Slip Copy 240523.pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Slip Copy 240523.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Slip Copy 240523.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Slip Copy 240523.pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\Slip Copy 240523.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Slip Copy 240523.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:792
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a6e3c6a4c830509064d35cc2fc4f1b9b
SHA17b5f5bd4ec562fe73e339d45d18b65289375d5ab
SHA256b3e2032075d5eb483d651c3c0fe142793aeda5511400ca04259b70d896b0f788
SHA512604549245cd818cffd0ed4b8b04df3919f8bc9db6dcdde0190ded50671c062e0a5f664c1c5b88fed5a05b0b191300d07dba06c4a8f6ab63cf16c5a76303bd1b4