Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-09-2023 11:41
Static task
static1
Behavioral task
behavioral1
Sample
overdue invoices pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
overdue invoices pdf.exe
Resource
win10v2004-20230831-en
General
-
Target
overdue invoices pdf.exe
-
Size
729KB
-
MD5
fbad6ae9a778119e7fa68a4af950ea1d
-
SHA1
6cac78884894a7415498c70a8e5bb0818a0535ca
-
SHA256
6461077970b9463db60faad97819790772c4b8cf94cc068d6a6524f5b7fc28de
-
SHA512
bdb0011bc91e9e0abbbefafdce79e8584cf63971c7f5ba7f73a1b46e6a3839cc033f43c842e3db4f8f435f1c9dea80ef2ff551201d8a00b007a45029dc32ebf4
-
SSDEEP
12288:DUOPypIzGfOUmJZeClB3/AaJzD9DhyKftDKUACZKA6Pj5wox9avEFh:DUOPypIzGWUgZxDN5D91bFKULKvPjmo6
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vpindustries.co.in - Port:
587 - Username:
[email protected] - Password:
saleS*9988 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 2752 2096 overdue invoices pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2480 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2096 overdue invoices pdf.exe 2096 overdue invoices pdf.exe 2096 overdue invoices pdf.exe 2096 overdue invoices pdf.exe 2892 powershell.exe 2676 powershell.exe 2752 RegSvcs.exe 2752 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2096 overdue invoices pdf.exe Token: SeDebugPrivilege 2752 RegSvcs.exe Token: SeDebugPrivilege 2676 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2892 2096 overdue invoices pdf.exe 30 PID 2096 wrote to memory of 2892 2096 overdue invoices pdf.exe 30 PID 2096 wrote to memory of 2892 2096 overdue invoices pdf.exe 30 PID 2096 wrote to memory of 2892 2096 overdue invoices pdf.exe 30 PID 2096 wrote to memory of 2676 2096 overdue invoices pdf.exe 32 PID 2096 wrote to memory of 2676 2096 overdue invoices pdf.exe 32 PID 2096 wrote to memory of 2676 2096 overdue invoices pdf.exe 32 PID 2096 wrote to memory of 2676 2096 overdue invoices pdf.exe 32 PID 2096 wrote to memory of 2480 2096 overdue invoices pdf.exe 33 PID 2096 wrote to memory of 2480 2096 overdue invoices pdf.exe 33 PID 2096 wrote to memory of 2480 2096 overdue invoices pdf.exe 33 PID 2096 wrote to memory of 2480 2096 overdue invoices pdf.exe 33 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 PID 2096 wrote to memory of 2752 2096 overdue invoices pdf.exe 36 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\overdue invoices pdf.exe"C:\Users\Admin\AppData\Local\Temp\overdue invoices pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\overdue invoices pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WWmKPXzD.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WWmKPXzD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF00A.tmp"2⤵
- Creates scheduled task(s)
PID:2480
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b408dca9d95d78f6e827f79436882a89
SHA19d43ad85b080cbcb792f86c247e13a4326b55599
SHA2561a446383bcfe4cf8a18b07e75167bc9634637d4710cea5d3b9b5c070dba1a752
SHA5126c5884788f130b0af5baaf4b51b00fba1941539a2e5b1cb91ae121dbcb1c7e08c4a6a2dc28d874f51e3dea680a6dc292705e94bce8dd8aa181913fbbd517bd64
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\E3UN3CH4M97ERWKHX1I8.temp
Filesize7KB
MD57daea88360980e73977486d1cf5eab2b
SHA199109554a46abb517524bc4304455a39438cd882
SHA256ec43ecce8c913763ad798971ec4ae95da22c3ee4fd8497518fe168bfb79ade21
SHA5124f8dbadcff976fb2eeb6ba2c5282b24b39a0005fbcc49774e139ea784ff050f1c5a532e1538b0a75b4258d10509278e1d727444b3affd57c9eeb8d043311d2db
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57daea88360980e73977486d1cf5eab2b
SHA199109554a46abb517524bc4304455a39438cd882
SHA256ec43ecce8c913763ad798971ec4ae95da22c3ee4fd8497518fe168bfb79ade21
SHA5124f8dbadcff976fb2eeb6ba2c5282b24b39a0005fbcc49774e139ea784ff050f1c5a532e1538b0a75b4258d10509278e1d727444b3affd57c9eeb8d043311d2db