Analysis
-
max time kernel
63s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
26/05/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
COMPROBANTE DE OPERACION.pdf.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
COMPROBANTE DE OPERACION.pdf.exe
Resource
win10v2004-20230220-en
General
-
Target
COMPROBANTE DE OPERACION.pdf.exe
-
Size
669KB
-
MD5
14236c9ac7f133ed7f0bc4cf526cd412
-
SHA1
2cfd0e2a18ed5de9d216dc5c7bdf3bf761ca184f
-
SHA256
5241d93369ff133d1aa4381a074806b10d37f414261f89f2198ef76d238b5ec1
-
SHA512
f27dc52558a64012da03b480e230fa7c832dd177524be5f5ef9139e5bd5b186df3c3d207e082db0d7a375ef4f7b27973f1bbeee5e424b300b68c2c459602b6ec
-
SSDEEP
12288:GKb7z5GoJiGaq5auIDxCp0GsCzrSn5hHnPx49QlosnPTYDEM4CI1pTP5kCba6:t5GoR5aZdw0G96nHnJ7loyrVCQ5ba6
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.itzayanaland.com - Port:
587 - Username:
[email protected] - Password:
H!S6_PFHTAN{ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 COMPROBANTE DE OPERACION.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 COMPROBANTE DE OPERACION.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 COMPROBANTE DE OPERACION.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1704 set thread context of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1864 COMPROBANTE DE OPERACION.pdf.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 PID 1704 wrote to memory of 1864 1704 COMPROBANTE DE OPERACION.pdf.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 COMPROBANTE DE OPERACION.pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3948302646-268491222-1934009652-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 COMPROBANTE DE OPERACION.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMPROBANTE DE OPERACION.pdf.exe"C:\Users\Admin\AppData\Local\Temp\COMPROBANTE DE OPERACION.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\COMPROBANTE DE OPERACION.pdf.exe"C:\Users\Admin\AppData\Local\Temp\COMPROBANTE DE OPERACION.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1864
-