Analysis
-
max time kernel
37s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2023 16:43
Static task
static1
Behavioral task
behavioral1
Sample
LAM CHUAN Q710901.pdf.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
LAM CHUAN Q710901.pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
LAM CHUAN Q710901.pdf.exe
-
Size
1024KB
-
MD5
8412a2cceb09519e18c3419df99efbad
-
SHA1
33fdcdd1ea11818c2928d80c52e786b0cca9e522
-
SHA256
7318815c5eed7085d6d336406e6c3255a23e255f5caa954b6b1b4549b7519701
-
SHA512
b81f90357485356ec5b678e19d41359db65e5b9f328a9d94d4d76fbecee5286cffbce4ce95c9dd7109044fe95b37abcfee6bae443930f22e5cc218808b849d8d
-
SSDEEP
24576:RBm634/up+pJtwFbGyArZTDOYDD/ckaCFUBkMIHpDqDDBi:RX38PJtw5Ag6D/6CFMkzpDH
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6439280362:AAFxJ6Gm_hfG3MYnjXvw0e4QQEIFTsOjkuk/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 61 api.ipify.org 62 api.ipify.org -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2536 4960 WerFault.exe MSBuild.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
LAM CHUAN Q710901.pdf.exepid process 816 LAM CHUAN Q710901.pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
LAM CHUAN Q710901.pdf.exedescription pid process Token: SeDebugPrivilege 816 LAM CHUAN Q710901.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\LAM CHUAN Q710901.pdf.exe"C:\Users\Admin\AppData\Local\Temp\LAM CHUAN Q710901.pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:816 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\LAM CHUAN Q710901.pdf.exe"2⤵PID:4324
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mhkwArwcw.exe"2⤵PID:2988
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mhkwArwcw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE76D.tmp"2⤵
- Creates scheduled task(s)
PID:3468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:4960
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4960 -s 21483⤵
- Program crash
PID:2536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 4960 -ip 49601⤵PID:3572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e622a93d68bb4ace8ad06829ff4f64d9
SHA1980f7bb759acecc719e6b4d5551abd7799be13df
SHA2566aa739f58dc627aba159fa46918402b3cb8637d8574312699cfe4fd5be24889e
SHA512824fdb79cb433e89033d08a8ae6cb98d055791098730cb3e3e2cfe88035b1fa24621d9781ffd0114c401e3500cadf3e8858ac312555cb5034dd3544e965ee527