Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2023, 08:02
Static task
static1
Behavioral task
behavioral1
Sample
ORDER LIST_AUG7FIBA00541·PDF.scr
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ORDER LIST_AUG7FIBA00541·PDF.scr
Resource
win10v2004-20230703-en
General
-
Target
ORDER LIST_AUG7FIBA00541·PDF.scr
-
Size
1.2MB
-
MD5
aca0fd54a8846dd69444e2c961098228
-
SHA1
c4a2e2257e7b9c956d8a52945db7d6ad827fd26b
-
SHA256
2ca750e641d81270a9ca70b2c38627e178f734126673480c3de97e7e2fb2966a
-
SHA512
643bc9156bcdbcf0b129428b673069255811998005793a8d2af9ae5ecbb6d92c79f8a421cb8e4134230916f4d8005783d2832d6cedfa5a6694662c7a24a52a02
-
SSDEEP
12288:B1wzapwTwIhJU9RIY/ykh1xjLELXVFyFZ6Kf1kats892OVaNUZ9pwVg:B1pwMIhCIZ00FyFhfmatsSkNw7t
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
nxhvhvlhjbskrvmk - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2736 set thread context of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2700 ipconfig.exe 944 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3516 aspnet_compiler.exe 3516 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2736 ORDER LIST_AUG7FIBA00541·PDF.scr Token: SeDebugPrivilege 3516 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3516 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1256 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 83 PID 2736 wrote to memory of 1256 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 83 PID 2736 wrote to memory of 1256 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 83 PID 1256 wrote to memory of 2700 1256 cmd.exe 85 PID 1256 wrote to memory of 2700 1256 cmd.exe 85 PID 1256 wrote to memory of 2700 1256 cmd.exe 85 PID 2736 wrote to memory of 4628 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 92 PID 2736 wrote to memory of 4628 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 92 PID 2736 wrote to memory of 4628 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 92 PID 4628 wrote to memory of 944 4628 cmd.exe 94 PID 4628 wrote to memory of 944 4628 cmd.exe 94 PID 4628 wrote to memory of 944 4628 cmd.exe 94 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95 PID 2736 wrote to memory of 3516 2736 ORDER LIST_AUG7FIBA00541·PDF.scr 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\ORDER LIST_AUG7FIBA00541·PDF.scr"C:\Users\Admin\AppData\Local\Temp\ORDER LIST_AUG7FIBA00541·PDF.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:944
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3516
-