Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
17/11/2023, 16:45
Static task
static1
Behavioral task
behavioral1
Sample
S25C pdf.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
S25C pdf.exe
Resource
win10v2004-20231023-en
General
-
Target
S25C pdf.exe
-
Size
830KB
-
MD5
fe9248da6b2c906f903252d6e4063286
-
SHA1
956e2ab03cb1f862f642a2f6f2e859b1a40edb1d
-
SHA256
5fa5a6b45df59e9fc4e65b5b56371e7c920716c2b2373233c3af9f2676797d36
-
SHA512
4b3b6a166e9ba5b5eb0ad8e5524ebec7e1b306ed76e822eddf59d697361aff52d724e25c9778af88aea2fc8e800671b6c800511e598cb8d3091ecbd9ec83c4c4
-
SSDEEP
12288:lbWoBa/mFiTEJ0+0OR8FCko17apYxr5zXe2QtKC47b1ec5sKXL/0QT+BRTYaW:lqS7apYhNO2Qtth6oysSb
Malware Config
Extracted
Protocol: smtp- Host:
mail.premiermotor.com.bn - Port:
587 - Username:
[email protected] - Password:
e3Q9hj?1
Extracted
agenttesla
Protocol: smtp- Host:
mail.premiermotor.com.bn - Port:
587 - Username:
[email protected] - Password:
e3Q9hj?1 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\Control Panel\International\Geo\Nation S25C pdf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HqAJrII = "C:\\Users\\Admin\\AppData\\Roaming\\HqAJrII\\HqAJrII.exe" S25C pdf.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 30 api.ipify.org 31 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3096 set thread context of 4916 3096 S25C pdf.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 888 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3096 S25C pdf.exe 3096 S25C pdf.exe 1476 powershell.exe 3096 S25C pdf.exe 4828 powershell.exe 3096 S25C pdf.exe 4916 S25C pdf.exe 4916 S25C pdf.exe 1476 powershell.exe 4828 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3096 S25C pdf.exe Token: SeDebugPrivilege 1476 powershell.exe Token: SeDebugPrivilege 4828 powershell.exe Token: SeDebugPrivilege 4916 S25C pdf.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 3096 wrote to memory of 1476 3096 S25C pdf.exe 94 PID 3096 wrote to memory of 1476 3096 S25C pdf.exe 94 PID 3096 wrote to memory of 1476 3096 S25C pdf.exe 94 PID 3096 wrote to memory of 4828 3096 S25C pdf.exe 96 PID 3096 wrote to memory of 4828 3096 S25C pdf.exe 96 PID 3096 wrote to memory of 4828 3096 S25C pdf.exe 96 PID 3096 wrote to memory of 888 3096 S25C pdf.exe 98 PID 3096 wrote to memory of 888 3096 S25C pdf.exe 98 PID 3096 wrote to memory of 888 3096 S25C pdf.exe 98 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100 PID 3096 wrote to memory of 4916 3096 S25C pdf.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\S25C pdf.exe"C:\Users\Admin\AppData\Local\Temp\S25C pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\S25C pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\AaPGfgAaiqEc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\AaPGfgAaiqEc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3B3F.tmp"2⤵
- Creates scheduled task(s)
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\S25C pdf.exe"C:\Users\Admin\AppData\Local\Temp\S25C pdf.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5e3cadb057f398e7823d07d15ac7e3a4f
SHA1bc91e433d8d2ce0a235109306a388cecdb0aef7d
SHA256846191355a5f2ce06fd541803d6595e4f9a324ac84cede73d37cdc3766b843e1
SHA51232f5035ae2848bd0a2da7948f96108f8e4019add2597b744619067cb1fee9ca466ae717dd5d757ccb1a967d73505321798e061e1129c0afca1c65264161e3683
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD591cb605d2c6b7adb3b065900dfe94eba
SHA15da6f9541b08b71cd85ce649cb2a8348ca7ff46c
SHA2567de48be726542caaca0c2c7187cf8f1e3fede523cb0f7cd42cc752cd35ec51ce
SHA512d80a651d1f0f1e90b6f5bd868a8c1948b9182a81f62b26f9d811aee42d1e2e05706d1a31cac4b11e39c7b3c6b8a4aee6857579d96a1d1c144dba0966c7349c78