Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
27/11/2023, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
Booking Form PIF.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Booking Form PIF.exe
Resource
win10v2004-20231020-en
General
-
Target
Booking Form PIF.exe
-
Size
769KB
-
MD5
a66fdde12faf0f568b9830be2d2a5a01
-
SHA1
634c7ce02120b119833722559ebefae0bd365b08
-
SHA256
f1275d38c32f7ba6f9fd37c85c3bcc7437bfe85d30b8141220176e4b00717533
-
SHA512
57f244731be426e53569d881d6e90d6d912d5b561501bfafcd274f8b67ce5888e7344f8fc123b8ad3386059fec7d470430b7af9c3aee74dd113afedef3ef7b6b
-
SSDEEP
12288:eO72CyeJcn0ypAFlDFY5+PnS1FMrckuroNQrV5gYEF:NV+AFlDOUPnSPMrct5Vvc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.mayaklogistic.ru - Port:
587 - Username:
[email protected] - Password:
Tommy8118 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2260 set thread context of 2428 2260 Booking Form PIF.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2260 Booking Form PIF.exe 2260 Booking Form PIF.exe 2740 powershell.exe 2872 powershell.exe 2428 Booking Form PIF.exe 2428 Booking Form PIF.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2260 Booking Form PIF.exe Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 2428 Booking Form PIF.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2740 2260 Booking Form PIF.exe 30 PID 2260 wrote to memory of 2740 2260 Booking Form PIF.exe 30 PID 2260 wrote to memory of 2740 2260 Booking Form PIF.exe 30 PID 2260 wrote to memory of 2740 2260 Booking Form PIF.exe 30 PID 2260 wrote to memory of 2872 2260 Booking Form PIF.exe 32 PID 2260 wrote to memory of 2872 2260 Booking Form PIF.exe 32 PID 2260 wrote to memory of 2872 2260 Booking Form PIF.exe 32 PID 2260 wrote to memory of 2872 2260 Booking Form PIF.exe 32 PID 2260 wrote to memory of 2624 2260 Booking Form PIF.exe 33 PID 2260 wrote to memory of 2624 2260 Booking Form PIF.exe 33 PID 2260 wrote to memory of 2624 2260 Booking Form PIF.exe 33 PID 2260 wrote to memory of 2624 2260 Booking Form PIF.exe 33 PID 2260 wrote to memory of 2304 2260 Booking Form PIF.exe 36 PID 2260 wrote to memory of 2304 2260 Booking Form PIF.exe 36 PID 2260 wrote to memory of 2304 2260 Booking Form PIF.exe 36 PID 2260 wrote to memory of 2304 2260 Booking Form PIF.exe 36 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37 PID 2260 wrote to memory of 2428 2260 Booking Form PIF.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PnKcNPNWgpbhiS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PnKcNPNWgpbhiS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2839.tmp"2⤵
- Creates scheduled task(s)
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"2⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD584b3b8b8a8b9bc0eb1bdb8a3c43ea121
SHA113cf21430fda661beb7aba7b48b34fc3420ac275
SHA2562cd0f48488b9967f7052be4238c6055c3032a3d129d407154c52ce35482cd824
SHA512da7df787e30d9f42dc8d0ff2af0754418569a808e538c4c9b5034ccc3e8f15b922634172415738c11aec6b0c026b4b0e84709dcf129bb6769c04bb9fa38ff3f7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\RSNQNYZ8WNWS4BQEQ56H.temp
Filesize7KB
MD50dd56006834ee1dc961ea56c10604635
SHA1594fdb63dbb41fb1e11f37a2ac93ea6c5c962f6b
SHA256e469d44be5a79169e10d57c50cdcf4c458de8ebdfe3bdd956654e16127dc2b04
SHA5129d5da6510ae329e40145aa25b8ac38684c195ba8fc098bd1a622604806e14bced60275a40b34387ec0f2ecfae4bf2412bf799b2901867062afdacfbda7253a2a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD50dd56006834ee1dc961ea56c10604635
SHA1594fdb63dbb41fb1e11f37a2ac93ea6c5c962f6b
SHA256e469d44be5a79169e10d57c50cdcf4c458de8ebdfe3bdd956654e16127dc2b04
SHA5129d5da6510ae329e40145aa25b8ac38684c195ba8fc098bd1a622604806e14bced60275a40b34387ec0f2ecfae4bf2412bf799b2901867062afdacfbda7253a2a