Analysis
-
max time kernel
19s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
05-12-2023 16:43
Static task
static1
Behavioral task
behavioral1
Sample
LAM CHUAN Q710901.pdf.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
LAM CHUAN Q710901.pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
LAM CHUAN Q710901.pdf.exe
-
Size
1024KB
-
MD5
8412a2cceb09519e18c3419df99efbad
-
SHA1
33fdcdd1ea11818c2928d80c52e786b0cca9e522
-
SHA256
7318815c5eed7085d6d336406e6c3255a23e255f5caa954b6b1b4549b7519701
-
SHA512
b81f90357485356ec5b678e19d41359db65e5b9f328a9d94d4d76fbecee5286cffbce4ce95c9dd7109044fe95b37abcfee6bae443930f22e5cc218808b849d8d
-
SSDEEP
24576:RBm634/up+pJtwFbGyArZTDOYDD/ckaCFUBkMIHpDqDDBi:RX38PJtw5Ag6D/6CFMkzpDH
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6439280362:AAFxJ6Gm_hfG3MYnjXvw0e4QQEIFTsOjkuk/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
LAM CHUAN Q710901.pdf.exepid process 1664 LAM CHUAN Q710901.pdf.exe 1664 LAM CHUAN Q710901.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
LAM CHUAN Q710901.pdf.exedescription pid process Token: SeDebugPrivilege 1664 LAM CHUAN Q710901.pdf.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
LAM CHUAN Q710901.pdf.exedescription pid process target process PID 1664 wrote to memory of 2728 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2728 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2728 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2728 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2668 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2668 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2668 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 2668 1664 LAM CHUAN Q710901.pdf.exe powershell.exe PID 1664 wrote to memory of 1964 1664 LAM CHUAN Q710901.pdf.exe schtasks.exe PID 1664 wrote to memory of 1964 1664 LAM CHUAN Q710901.pdf.exe schtasks.exe PID 1664 wrote to memory of 1964 1664 LAM CHUAN Q710901.pdf.exe schtasks.exe PID 1664 wrote to memory of 1964 1664 LAM CHUAN Q710901.pdf.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LAM CHUAN Q710901.pdf.exe"C:\Users\Admin\AppData\Local\Temp\LAM CHUAN Q710901.pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\LAM CHUAN Q710901.pdf.exe"2⤵PID:2728
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mhkwArwcw.exe"2⤵PID:2668
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mhkwArwcw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5476.tmp"2⤵
- Creates scheduled task(s)
PID:1964 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:2556
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ba5b117fa3ef2ac0c7af1b4aebb6335b
SHA1d48e683c520d6af264ad4b35d1188fc5d20108ef
SHA256a18f52c333a28398cfc77cb7acf43e7d4792beb0de5d6c639cb859a2d03b26c7
SHA5125834ce0099b87d901250e004683b7bffeca72880087ac35bdca7cd8ddfee2940c6521cd192133e5cd1bd8d7af7b8ec7bb0f99413ad2699239f1970047c9593b5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\98JT253627MZ41Q57ONI.temp
Filesize7KB
MD5bb29778a5e99ca434f31e0faa45f0c47
SHA1c3912ac0242eefb1a01ef9d6872326750da67637
SHA2560e09fae04087f59a7e83ca8d8503d0915825e7ee6478eb25cbbcaf820efc71a9
SHA5125581e1b20f1f688d359abc247c336fcdd4560634f19c175ba630b37380678cbc79acad29d921022b8ff13bc94b9443e8cdc662db180a289ac0bf81ffd69a68b7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5bb29778a5e99ca434f31e0faa45f0c47
SHA1c3912ac0242eefb1a01ef9d6872326750da67637
SHA2560e09fae04087f59a7e83ca8d8503d0915825e7ee6478eb25cbbcaf820efc71a9
SHA5125581e1b20f1f688d359abc247c336fcdd4560634f19c175ba630b37380678cbc79acad29d921022b8ff13bc94b9443e8cdc662db180a289ac0bf81ffd69a68b7