Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2023, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
Booking Form PIF.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Booking Form PIF.exe
Resource
win10v2004-20231020-en
General
-
Target
Booking Form PIF.exe
-
Size
769KB
-
MD5
a66fdde12faf0f568b9830be2d2a5a01
-
SHA1
634c7ce02120b119833722559ebefae0bd365b08
-
SHA256
f1275d38c32f7ba6f9fd37c85c3bcc7437bfe85d30b8141220176e4b00717533
-
SHA512
57f244731be426e53569d881d6e90d6d912d5b561501bfafcd274f8b67ce5888e7344f8fc123b8ad3386059fec7d470430b7af9c3aee74dd113afedef3ef7b6b
-
SSDEEP
12288:eO72CyeJcn0ypAFlDFY5+PnS1FMrckuroNQrV5gYEF:NV+AFlDOUPnSPMrct5Vvc
Malware Config
Extracted
Protocol: smtp- Host:
mail.mayaklogistic.ru - Port:
587 - Username:
[email protected] - Password:
Tommy8118
Extracted
agenttesla
Protocol: smtp- Host:
mail.mayaklogistic.ru - Port:
587 - Username:
[email protected] - Password:
Tommy8118 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation Booking Form PIF.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 4852 2912 Booking Form PIF.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3108 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1512 powershell.exe 4452 powershell.exe 4852 Booking Form PIF.exe 4852 Booking Form PIF.exe 4452 powershell.exe 1512 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4452 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 4852 Booking Form PIF.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2912 wrote to memory of 1512 2912 Booking Form PIF.exe 95 PID 2912 wrote to memory of 1512 2912 Booking Form PIF.exe 95 PID 2912 wrote to memory of 1512 2912 Booking Form PIF.exe 95 PID 2912 wrote to memory of 4452 2912 Booking Form PIF.exe 97 PID 2912 wrote to memory of 4452 2912 Booking Form PIF.exe 97 PID 2912 wrote to memory of 4452 2912 Booking Form PIF.exe 97 PID 2912 wrote to memory of 3108 2912 Booking Form PIF.exe 99 PID 2912 wrote to memory of 3108 2912 Booking Form PIF.exe 99 PID 2912 wrote to memory of 3108 2912 Booking Form PIF.exe 99 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101 PID 2912 wrote to memory of 4852 2912 Booking Form PIF.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PnKcNPNWgpbhiS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4452
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PnKcNPNWgpbhiS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4FFF.tmp"2⤵
- Creates scheduled task(s)
PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"C:\Users\Admin\AppData\Local\Temp\Booking Form PIF.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5cb806cd182a0cd1794a9e4c36ffbccbd
SHA1cf7f526f5ab7ff19babcffbb7dbbdd3de29de00e
SHA2562fe0f5e173ce80196ae1e4e5fc77d93af13cd004c07549a8baa6763f4e4f563f
SHA512d3b1772507de0056f142221c65ade83304da394fceb4c4406ec03f4b7755a8bb3048a8e37f5aa43377d37866341f093af858669eb7c7a2590438d25557f54e7a