Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
19-09-2023 05:51
Static task
static1
Behavioral task
behavioral1
Sample
SOA pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SOA pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
SOA pdf.exe
-
Size
684KB
-
MD5
ef016c57887c795245f3c993844050b1
-
SHA1
a01a18332c13b3fea59c7ff5b2c0efe89811c5ee
-
SHA256
19e6653f249d7283999ba5be8b4154ccf64693cf228c7f7b4fde670f9fbed711
-
SHA512
ef833dda1825b56120174e8c79edb371ee6e3441b384d623d198e8968250bd7cc08c475c00cd30656d8300735c3da308019a9d1f10b8ff324ab054e409541b15
-
SSDEEP
12288:p4YpAfDuHOXEjxlubLoPpoL6HrOngIVGYm9qv28y6+Jz1g5:GYpgOjxlioxXHrOg89vRy62O
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
host2069.hostmonster.com - Port:
587 - Username:
[email protected] - Password:
me!@#!@#!@#!@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows\CurrentVersion\Run\qXYojnj = "C:\\Users\\Admin\\AppData\\Roaming\\qXYojnj\\qXYojnj.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2316 set thread context of 1836 2316 SOA pdf.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 2316 SOA pdf.exe 1836 RegSvcs.exe 1836 RegSvcs.exe 2380 powershell.exe 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2316 SOA pdf.exe Token: SeDebugPrivilege 1836 RegSvcs.exe Token: SeDebugPrivilege 2380 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2844 2316 SOA pdf.exe 30 PID 2316 wrote to memory of 2844 2316 SOA pdf.exe 30 PID 2316 wrote to memory of 2844 2316 SOA pdf.exe 30 PID 2316 wrote to memory of 2844 2316 SOA pdf.exe 30 PID 2316 wrote to memory of 2380 2316 SOA pdf.exe 32 PID 2316 wrote to memory of 2380 2316 SOA pdf.exe 32 PID 2316 wrote to memory of 2380 2316 SOA pdf.exe 32 PID 2316 wrote to memory of 2380 2316 SOA pdf.exe 32 PID 2316 wrote to memory of 2576 2316 SOA pdf.exe 35 PID 2316 wrote to memory of 2576 2316 SOA pdf.exe 35 PID 2316 wrote to memory of 2576 2316 SOA pdf.exe 35 PID 2316 wrote to memory of 2576 2316 SOA pdf.exe 35 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 2580 2316 SOA pdf.exe 36 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 PID 2316 wrote to memory of 1836 2316 SOA pdf.exe 37 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3750544865-3773649541-1858556521-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OIeSyIYJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OIeSyIYJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp493.tmp"2⤵
- Creates scheduled task(s)
PID:2576
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51bf440882913cbc3d924cbd89b395645
SHA1eebc707b9519eb705b2e90d2c53c218c4e567a8d
SHA256fd250b850c3cd632a54cd31ff7a009f121d5de22f532f8a09f6d7fd5cc56fe82
SHA512d6f458d58e4c0060a7d0e7ac83c438d87cd50f952fb85587ea36adb60f159f1d32a05bf20e9dd6df5240cc84f36659e2b340105923964fbb4e3fdd2f6bf4f49f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MW5QRFFARN4EQTJGTG8O.temp
Filesize7KB
MD542d634c92900001c7b3c716a2120f55a
SHA18c0c0b4fb7fbadec594f1ce68d1209114aa66de5
SHA2567ebd7f742b20d6bf4f48342be59d38b8b9f500284a65b5b50cb71aef8207df45
SHA51288b12e3db6b337e6a6c55d89129dcdf35c8270528fee394e2672e96f0bda87f881a6d368d9e0838bbbb836d1635d4c620bb03bf735b420057cfbfdb1dc4b91b8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD542d634c92900001c7b3c716a2120f55a
SHA18c0c0b4fb7fbadec594f1ce68d1209114aa66de5
SHA2567ebd7f742b20d6bf4f48342be59d38b8b9f500284a65b5b50cb71aef8207df45
SHA51288b12e3db6b337e6a6c55d89129dcdf35c8270528fee394e2672e96f0bda87f881a6d368d9e0838bbbb836d1635d4c620bb03bf735b420057cfbfdb1dc4b91b8