Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    04-12-2023 16:02

General

  • Target

    OUTSTANDING INVOICE.pdf_____________________________________________________________________________.exe

  • Size

    909KB

  • MD5

    0167b00f658c04b84b22927a449106eb

  • SHA1

    177e099d9470f371f53d063b9c68703cde2b6977

  • SHA256

    1fa497fd2ea5004a12f885d7dac2b47c0494aae2fbe45eb70f96a7f3bb03cbd1

  • SHA512

    d4bc3736404708398349efb8f190887c48d7d06f86115a2a51ebd030fea031230892e86614aff3a2bcd75c4fa67d902cfd1ed72a960e7dc41e68f99219d2253f

  • SSDEEP

    24576:9Tm4Qyr3+0Dda+2GBxy0QbiU+XL9XKMvO:xm4Y0DtvBQbL8LT

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE.pdf_____________________________________________________________________________.exe
    "C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE.pdf_____________________________________________________________________________.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2916
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\OUTSTANDING INVOICE.pdf_____________________________________________________________________________.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2164
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gbEFiipzn.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2708
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gbEFiipzn" /XML "C:\Users\Admin\AppData\Local\Temp\tmp53FA.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2520
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp53FA.tmp

    Filesize

    1KB

    MD5

    53811a53f48f1d7145f0c9b5f2a0a6fc

    SHA1

    d39fe6a484309f6f6f155c133112b0d5d00809ae

    SHA256

    dc04c07791a77bfcd094894d61c03972d738b2e1ebf18948c88fde618c9c772e

    SHA512

    6e822509c3854efca19ff72c44e55ac8427ba720c7096beec5b27893940252ca0aedbd55d6e1fe3bd657003c889e5175315961988b39ee76f92591d398f6cc2a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PHTB94NG3V5QA8SZPYGL.temp

    Filesize

    7KB

    MD5

    a3934890181c802ce525180e5c3c7c88

    SHA1

    968bf26ea1519beb5dba04ec2ae7c99d7a5f8d40

    SHA256

    7f1973a4bdb5eb85312b4e53f1908765dd0d337d0dcc0b24f3ec0155349feab0

    SHA512

    2046437ab46c3c5dd95daf0701056254bb661eee2cec8b9770d86dc0c12cb7f255895d014d7a1742f5d6ca19a0a2542eeeaa50a9bc07ed095a967ec82006fc40

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    a3934890181c802ce525180e5c3c7c88

    SHA1

    968bf26ea1519beb5dba04ec2ae7c99d7a5f8d40

    SHA256

    7f1973a4bdb5eb85312b4e53f1908765dd0d337d0dcc0b24f3ec0155349feab0

    SHA512

    2046437ab46c3c5dd95daf0701056254bb661eee2cec8b9770d86dc0c12cb7f255895d014d7a1742f5d6ca19a0a2542eeeaa50a9bc07ed095a967ec82006fc40

  • memory/2164-31-0x000000006EC90000-0x000000006F23B000-memory.dmp

    Filesize

    5.7MB

  • memory/2164-44-0x000000006EC90000-0x000000006F23B000-memory.dmp

    Filesize

    5.7MB

  • memory/2164-27-0x000000006EC90000-0x000000006F23B000-memory.dmp

    Filesize

    5.7MB

  • memory/2572-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2572-46-0x00000000740D0000-0x00000000747BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2572-43-0x00000000740D0000-0x00000000747BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2572-40-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-42-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-24-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-20-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-22-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-36-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2572-28-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2708-25-0x000000006EC90000-0x000000006F23B000-memory.dmp

    Filesize

    5.7MB

  • memory/2708-33-0x000000006EC90000-0x000000006F23B000-memory.dmp

    Filesize

    5.7MB

  • memory/2708-29-0x0000000002EA0000-0x0000000002EE0000-memory.dmp

    Filesize

    256KB

  • memory/2708-45-0x000000006EC90000-0x000000006F23B000-memory.dmp

    Filesize

    5.7MB

  • memory/2708-35-0x0000000002EA0000-0x0000000002EE0000-memory.dmp

    Filesize

    256KB

  • memory/2916-19-0x00000000740D0000-0x00000000747BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-4-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB

  • memory/2916-1-0x00000000740D0000-0x00000000747BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-39-0x00000000740D0000-0x00000000747BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2916-0-0x00000000010F0000-0x00000000011DA000-memory.dmp

    Filesize

    936KB

  • memory/2916-2-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB

  • memory/2916-3-0x00000000003E0000-0x00000000003F8000-memory.dmp

    Filesize

    96KB

  • memory/2916-6-0x0000000000420000-0x000000000049A000-memory.dmp

    Filesize

    488KB

  • memory/2916-37-0x0000000004C20000-0x0000000004C60000-memory.dmp

    Filesize

    256KB

  • memory/2916-5-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB