Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28-08-2023 13:16
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoice pdf.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
overdue invoice pdf.exe
Resource
win10v2004-20230703-en
General
-
Target
overdue invoice pdf.exe
-
Size
847KB
-
MD5
a3976a8131593cd5f257e1609cba021c
-
SHA1
1e761268105bc1613d697d9941447c3241463029
-
SHA256
0f350d7a72e30d6fa7234e953e127b426ffabb6960446a90a53d6c0dd6392138
-
SHA512
d8b5c3b2d39b1fe89a5db1fc273527c163ebac5f2933799cc279b76def0eecd7e3047bb29b0b7c9feb6b6fe92ca8d302e52cd277da08f07f75f1676d0dac75eb
-
SSDEEP
12288:LUVv25w+n42d1mbTzFgaJmv3xnPBtDPLd4o8wTrQ2lIC6swoeXGkDkNMw+gtYaIS:LdcBmvxLLFHIvtXGkDkSwvYmZf
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vpindustries.co.in - Port:
587 - Username:
[email protected] - Password:
saleS*9988 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-377084978-2088738870-2818360375-1000\Software\Microsoft\Windows\CurrentVersion\Run\RdYoK = "C:\\Users\\Admin\\AppData\\Roaming\\RdYoK\\RdYoK.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 2288 2220 overdue invoice pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2944 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2952 powershell.exe 2920 powershell.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2220 overdue invoice pdf.exe 2288 RegSvcs.exe 2288 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2220 overdue invoice pdf.exe Token: SeDebugPrivilege 2952 powershell.exe Token: SeDebugPrivilege 2920 powershell.exe Token: SeDebugPrivilege 2288 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2920 2220 overdue invoice pdf.exe 30 PID 2220 wrote to memory of 2920 2220 overdue invoice pdf.exe 30 PID 2220 wrote to memory of 2920 2220 overdue invoice pdf.exe 30 PID 2220 wrote to memory of 2920 2220 overdue invoice pdf.exe 30 PID 2220 wrote to memory of 2952 2220 overdue invoice pdf.exe 32 PID 2220 wrote to memory of 2952 2220 overdue invoice pdf.exe 32 PID 2220 wrote to memory of 2952 2220 overdue invoice pdf.exe 32 PID 2220 wrote to memory of 2952 2220 overdue invoice pdf.exe 32 PID 2220 wrote to memory of 2944 2220 overdue invoice pdf.exe 34 PID 2220 wrote to memory of 2944 2220 overdue invoice pdf.exe 34 PID 2220 wrote to memory of 2944 2220 overdue invoice pdf.exe 34 PID 2220 wrote to memory of 2944 2220 overdue invoice pdf.exe 34 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36 PID 2220 wrote to memory of 2288 2220 overdue invoice pdf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoice pdf.exe"C:\Users\Admin\AppData\Local\Temp\overdue invoice pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\overdue invoice pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\artlkRu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\artlkRu" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2194.tmp"2⤵
- Creates scheduled task(s)
PID:2944
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5320d45cca1dca26e81dbf646cc4f9b59
SHA1ae18ca1f4a7ddf28589ebb7f8b9dbea0f459d620
SHA256d96ecd8b1b7bc5bcf547ce0480b1af748fbd370524140eb0f5a999add23bd885
SHA51250c3ee98cf730907f9d9b3a20b9e15c7b3a38e52636e6e8054e36faa0bb79aa444f3790aabbcdeae52d8abca795d759f35963d322adbdd2a766f3502ecaeac55
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\J2DB8P6FGAY8DCYWOAZ7.temp
Filesize7KB
MD59cc6dd1e13e517bacee806ab89d78659
SHA1f6cb0d37e99b7230e317c409cdba8426e972bbef
SHA2564cb757aebad29c46df56fa728df75ee97e26c3f854ae32173f1f6e873e56d340
SHA512e071137785e6c838ca38a9329da73ca1b1d0fd7060bd6af9001df79a713a51b0dc4408d452fceac92f003fc6df85c7ed0dedb915c57e998cac627aef58dbb486
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD59cc6dd1e13e517bacee806ab89d78659
SHA1f6cb0d37e99b7230e317c409cdba8426e972bbef
SHA2564cb757aebad29c46df56fa728df75ee97e26c3f854ae32173f1f6e873e56d340
SHA512e071137785e6c838ca38a9329da73ca1b1d0fd7060bd6af9001df79a713a51b0dc4408d452fceac92f003fc6df85c7ed0dedb915c57e998cac627aef58dbb486