Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01/09/2023, 14:05
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoices pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
overdue invoices pdf.exe
Resource
win10v2004-20230831-en
General
-
Target
overdue invoices pdf.exe
-
Size
729KB
-
MD5
fbad6ae9a778119e7fa68a4af950ea1d
-
SHA1
6cac78884894a7415498c70a8e5bb0818a0535ca
-
SHA256
6461077970b9463db60faad97819790772c4b8cf94cc068d6a6524f5b7fc28de
-
SHA512
bdb0011bc91e9e0abbbefafdce79e8584cf63971c7f5ba7f73a1b46e6a3839cc033f43c842e3db4f8f435f1c9dea80ef2ff551201d8a00b007a45029dc32ebf4
-
SSDEEP
12288:DUOPypIzGfOUmJZeClB3/AaJzD9DhyKftDKUACZKA6Pj5wox9avEFh:DUOPypIzGWUgZxDN5D91bFKULKvPjmo6
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vpindustries.co.in - Port:
587 - Username:
[email protected] - Password:
saleS*9988 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 59 IoCs
pid Process 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 2596 powershell.exe 2124 powershell.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe 1932 overdue invoices pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1932 overdue invoices pdf.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2124 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2124 1932 overdue invoices pdf.exe 28 PID 1932 wrote to memory of 2124 1932 overdue invoices pdf.exe 28 PID 1932 wrote to memory of 2124 1932 overdue invoices pdf.exe 28 PID 1932 wrote to memory of 2124 1932 overdue invoices pdf.exe 28 PID 1932 wrote to memory of 2596 1932 overdue invoices pdf.exe 31 PID 1932 wrote to memory of 2596 1932 overdue invoices pdf.exe 31 PID 1932 wrote to memory of 2596 1932 overdue invoices pdf.exe 31 PID 1932 wrote to memory of 2596 1932 overdue invoices pdf.exe 31 PID 1932 wrote to memory of 2716 1932 overdue invoices pdf.exe 32 PID 1932 wrote to memory of 2716 1932 overdue invoices pdf.exe 32 PID 1932 wrote to memory of 2716 1932 overdue invoices pdf.exe 32 PID 1932 wrote to memory of 2716 1932 overdue invoices pdf.exe 32 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36 PID 1932 wrote to memory of 2544 1932 overdue invoices pdf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoices pdf.exe"C:\Users\Admin\AppData\Local\Temp\overdue invoices pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\overdue invoices pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WWmKPXzD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WWmKPXzD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD4BD.tmp"2⤵
- Creates scheduled task(s)
PID:2716
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56a409882bafdfd633db887a2ee5fa4e0
SHA15ef30f21374797576d08a71091e20c9a77bdd208
SHA256bbdaf51cfb60757801a7e4bd8a60661a07e2cb078f7ca09888f9233f5e13bae2
SHA512d2d4b766bb1564052510f65374a579ba0de0b7d098b662438abda935f9c75fa60aa7aea33d8ad02cf059eba17002c9fed6fa7ebe67bfd182fde445660b519260
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B4N2I14LIRNSVOV1VFFE.temp
Filesize7KB
MD569b2d17d2e67116f85594added185269
SHA156c3aa7bb0a510df52e225d6c5ec232480d85bcb
SHA256bae2f8157d886e73cee362d41add432bbac4355a568a9d797333f7f3a05ac47a
SHA512d56ac7de408741f9c26536e50de91e7b849b71bc20c71952c016d30cb9ec5225a98404ca52e7d1bdd69e00c7e095ddd9ca39a4be0faa98574dc027589beb5c9b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD569b2d17d2e67116f85594added185269
SHA156c3aa7bb0a510df52e225d6c5ec232480d85bcb
SHA256bae2f8157d886e73cee362d41add432bbac4355a568a9d797333f7f3a05ac47a
SHA512d56ac7de408741f9c26536e50de91e7b849b71bc20c71952c016d30cb9ec5225a98404ca52e7d1bdd69e00c7e095ddd9ca39a4be0faa98574dc027589beb5c9b