Analysis
-
max time kernel
141s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2023 07:31
Static task
static1
Behavioral task
behavioral1
Sample
SÖZLEŞME-pdf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
SÖZLEŞME-pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
SÖZLEŞME-pdf.exe
-
Size
701KB
-
MD5
62078921f530e580c1df7e86bf9975a1
-
SHA1
6589ad060056166c90136ba0313c1e580e478fdd
-
SHA256
3c0a5c75a24724f85305ffe4831cc0303f9eaa1e2b3a897a91cb808429b34845
-
SHA512
b9b3aceba175deffdb04687d885f88de035cc76df590f621a12b55ec798eb218b2d66531d9055cad51dfb5f2e1b8a98c262e467d0716506b567d3691af817dd0
-
SSDEEP
12288:lwFGHET8v6M1Q0Lxa4cdpv0yLHYGBHj4LrMpKWlnZylgimtdYM3O0V7bb:l5HETcTQ6M4ct8w00ylgZtub0V7
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini SÖZLEŞME-pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4488 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3736 powershell.exe 4488 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3736 set thread context of 4488 3736 powershell.exe 105 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\cockling.lnk SÖZLEŞME-pdf.exe File opened for modification C:\Program Files (x86)\cockling.lnk SÖZLEŞME-pdf.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod SÖZLEŞME-pdf.exe File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski SÖZLEŞME-pdf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk SÖZLEŞME-pdf.exe File opened for modification C:\Windows\Calottes.Doo SÖZLEŞME-pdf.exe File opened for modification C:\Windows\bagvognen.lnk SÖZLEŞME-pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1496 4488 WerFault.exe 105 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 3736 powershell.exe 4488 msbuild.exe 4488 msbuild.exe 4488 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3736 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3736 powershell.exe Token: SeDebugPrivilege 4488 msbuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1756 wrote to memory of 3736 1756 SÖZLEŞME-pdf.exe 82 PID 1756 wrote to memory of 3736 1756 SÖZLEŞME-pdf.exe 82 PID 1756 wrote to memory of 3736 1756 SÖZLEŞME-pdf.exe 82 PID 3736 wrote to memory of 4488 3736 powershell.exe 105 PID 3736 wrote to memory of 4488 3736 powershell.exe 105 PID 3736 wrote to memory of 4488 3736 powershell.exe 105 PID 3736 wrote to memory of 4488 3736 powershell.exe 105 PID 3736 wrote to memory of 4488 3736 powershell.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\SÖZLEŞME-pdf.exe"C:\Users\Admin\AppData\Local\Temp\SÖZLEŞME-pdf.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$bungfu=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Dispersionerne.Amb77';$Sjusserne=$bungfu.SubString(50752,3);.$Sjusserne($bungfu)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4488 -s 18604⤵
- Program crash
PID:1496
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4488 -ip 44881⤵PID:1928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
293KB
MD507f672cc4e0e8d3856b4324b80b59275
SHA1596ceb4b0a3be1029c2be0f633b2f5f4734c4fc0
SHA256a32785d716991ef0b1ab3af1ba58a5d90fbc03a30431d0ff2d538d0bb2cfc5c3
SHA51258a692f5347eada5fa9a97cc5f85b2a4c46419c14b8d0cb67c5d4a6a464b5f2b942ac1c6b10efb0d5a2b7c0f291d85dd8a4878c06fe7996ae6df829bd274354d
-
Filesize
49KB
MD56f471e56b57ed402dd3d0659e4c4489e
SHA1e3f351b01dd96b408599c1165786635d2332012f
SHA2567834c9ab2a3f5f0c1d945474a350d8cc1437502931ef6f115c3a77869ae3ba01
SHA51206773bd5be240c213dc54dc1e4dc2a0f0da40335c15dd93639e8aa4da6a279fa321f395399bb115ed17c6585fc9e2bba3bfca2255bcb02c4f553f9a748ceb8d4