Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17-07-2023 07:11
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.pdf.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
PURCHASE ORDER.pdf.exe
Resource
win10v2004-20230703-en
General
-
Target
PURCHASE ORDER.pdf.exe
-
Size
609KB
-
MD5
cc1654f37d3a19d363abae9afd112788
-
SHA1
1906b798cb71daffe4aa209383467b5dd6f19678
-
SHA256
ec57c2de3349840ec8ac00000c964ba5c68cda5b954f6ea4ca3ced7098257286
-
SHA512
5d0a27f73ebd2e3ec0fe120ee2a5e842fa9d73e3a64f003bfb670262e24f46386fd571576da1e0e5aaeca2d1d6bafd7104ea0d3ba6e4c1eab3cf806847689b3a
-
SSDEEP
12288:czP5fztK7xB73farrIiPBMFCQ4INiqI/V:e5fRKdBbCr0iAJNDa
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.expertsconsultgh.co - Port:
587 - Username:
[email protected] - Password:
Oppong.2012 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation PURCHASE ORDER.pdf.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 53 api.ipify.org 54 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2908 set thread context of 3508 2908 PURCHASE ORDER.pdf.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2704 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2908 PURCHASE ORDER.pdf.exe 2908 PURCHASE ORDER.pdf.exe 3564 powershell.exe 5104 powershell.exe 2908 PURCHASE ORDER.pdf.exe 3564 powershell.exe 5104 powershell.exe 3508 RegSvcs.exe 3508 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2908 PURCHASE ORDER.pdf.exe Token: SeDebugPrivilege 3564 powershell.exe Token: SeDebugPrivilege 5104 powershell.exe Token: SeDebugPrivilege 3508 RegSvcs.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2908 wrote to memory of 3564 2908 PURCHASE ORDER.pdf.exe 101 PID 2908 wrote to memory of 3564 2908 PURCHASE ORDER.pdf.exe 101 PID 2908 wrote to memory of 3564 2908 PURCHASE ORDER.pdf.exe 101 PID 2908 wrote to memory of 5104 2908 PURCHASE ORDER.pdf.exe 103 PID 2908 wrote to memory of 5104 2908 PURCHASE ORDER.pdf.exe 103 PID 2908 wrote to memory of 5104 2908 PURCHASE ORDER.pdf.exe 103 PID 2908 wrote to memory of 2704 2908 PURCHASE ORDER.pdf.exe 105 PID 2908 wrote to memory of 2704 2908 PURCHASE ORDER.pdf.exe 105 PID 2908 wrote to memory of 2704 2908 PURCHASE ORDER.pdf.exe 105 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 PID 2908 wrote to memory of 3508 2908 PURCHASE ORDER.pdf.exe 107 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\fvTrCsArItt.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5104
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fvTrCsArItt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4234.tmp"2⤵
- Creates scheduled task(s)
PID:2704
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:3508
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5fa289eb469d4320012b7693a5ff4411a
SHA1540f9346c0a74efa8ae3a2cf55fb8db527ed89fb
SHA256069e201b8d20aa713eb341df1c07fe34eb7e41dc879103ab13341488a552f1ef
SHA51246cc7a9d136510a24f5e2384fed7294898cdd43f1103751acd5c741a9335f0f68c1975c8fdfb1bf91894fe9da088ab35b89b8ed9a79a810cbe3b355a07fe5bfc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5444efa58d2a124daf5b3ec573c958587
SHA166a16a4cff370680d3c7fdac58095d0f9dd208a9
SHA2569654fd533da55a6bcde9108ce71c50e558e2b6965f1373bf035782f1a970db12
SHA5123f015d154c63a8799b3ebe9f1733c6a693c8cf1a270d10f7fba706bd96453570042fc9af7716df98627f430ce6dcb07c31463251564175952003ceb621bf87b4