Analysis
-
max time kernel
131s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 15:00
Static task
static1
Behavioral task
behavioral1
Sample
SOA pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SOA pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
SOA pdf.exe
-
Size
684KB
-
MD5
ef016c57887c795245f3c993844050b1
-
SHA1
a01a18332c13b3fea59c7ff5b2c0efe89811c5ee
-
SHA256
19e6653f249d7283999ba5be8b4154ccf64693cf228c7f7b4fde670f9fbed711
-
SHA512
ef833dda1825b56120174e8c79edb371ee6e3441b384d623d198e8968250bd7cc08c475c00cd30656d8300735c3da308019a9d1f10b8ff324ab054e409541b15
-
SSDEEP
12288:p4YpAfDuHOXEjxlubLoPpoL6HrOngIVGYm9qv28y6+Jz1g5:GYpgOjxlioxXHrOg89vRy62O
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
host2069.hostmonster.com - Port:
587 - Username:
[email protected] - Password:
me!@#!@#!@#!@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows\CurrentVersion\Run\qXYojnj = "C:\\Users\\Admin\\AppData\\Roaming\\qXYojnj\\qXYojnj.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2076 set thread context of 1140 2076 SOA pdf.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1532 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 2076 SOA pdf.exe 1140 RegSvcs.exe 1140 RegSvcs.exe 2572 powershell.exe 2256 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2076 SOA pdf.exe Token: SeDebugPrivilege 1140 RegSvcs.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2256 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2076 wrote to memory of 2256 2076 SOA pdf.exe 30 PID 2076 wrote to memory of 2256 2076 SOA pdf.exe 30 PID 2076 wrote to memory of 2256 2076 SOA pdf.exe 30 PID 2076 wrote to memory of 2256 2076 SOA pdf.exe 30 PID 2076 wrote to memory of 2572 2076 SOA pdf.exe 32 PID 2076 wrote to memory of 2572 2076 SOA pdf.exe 32 PID 2076 wrote to memory of 2572 2076 SOA pdf.exe 32 PID 2076 wrote to memory of 2572 2076 SOA pdf.exe 32 PID 2076 wrote to memory of 1532 2076 SOA pdf.exe 34 PID 2076 wrote to memory of 1532 2076 SOA pdf.exe 34 PID 2076 wrote to memory of 1532 2076 SOA pdf.exe 34 PID 2076 wrote to memory of 1532 2076 SOA pdf.exe 34 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 2332 2076 SOA pdf.exe 36 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 764 2076 SOA pdf.exe 37 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 PID 2076 wrote to memory of 1140 2076 SOA pdf.exe 38 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2256
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\OIeSyIYJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OIeSyIYJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6529.tmp"2⤵
- Creates scheduled task(s)
PID:1532
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2332
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50b5008add8deb05339b5a3a36346aaad
SHA10cb97fdd352d06d5a103f4bdc40193d325f594ab
SHA2562300ca105389c9790773bf53774f89f70dfd846e33788804c9a709c8f5101da6
SHA512058c95b42598e97f973439645de1a4bf7fd3a56bb31373ba656662fa4d10f743cba99f1e02be60fa67d93712b401200fc534b52bf4137b28cfb4c65eecd10c2d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\L2GV8XO276K61N87HKZD.temp
Filesize7KB
MD51403bb801a42bb713585a492d9f0ba3f
SHA154bced7a5d2e764321ec7f25416949641b4653f6
SHA25648a91fa6756cf9b7de13a07b1a9cb997b2f92dab63807d64df95ab0878e15d1c
SHA512cb9dd308d1ea1f454ed172f3e8ba3a4321e56a0f66eb7de1d9c2be587cab87c1984a7480243b295071b06ce88f5f03b45ce77ec9fc2d18e637a12ab4549e625c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD51403bb801a42bb713585a492d9f0ba3f
SHA154bced7a5d2e764321ec7f25416949641b4653f6
SHA25648a91fa6756cf9b7de13a07b1a9cb997b2f92dab63807d64df95ab0878e15d1c
SHA512cb9dd308d1ea1f454ed172f3e8ba3a4321e56a0f66eb7de1d9c2be587cab87c1984a7480243b295071b06ce88f5f03b45ce77ec9fc2d18e637a12ab4549e625c