Analysis
-
max time kernel
142s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231023-en -
resource tags
arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 15:31
Static task
static1
Behavioral task
behavioral1
Sample
Payment Copy Pdf.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Payment Copy Pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
Payment Copy Pdf.exe
-
Size
420KB
-
MD5
79111a86d3b49cfd6064e27f5f2e6d83
-
SHA1
f61bc3418e9ca92b02f21c66af2ff94bede59f7e
-
SHA256
b9381cede9bdb49cd74a7ee1d5fa91a3b04bb99f4d3c8be2239f5bc268df8cfe
-
SHA512
17e04bd8663fbf88c3ae7125ff9bdca8f2ac649bf512fa0c2f0352ba57cfd3a794c58288c3977d2c1611ae97eb34ad1046a78211d1babebb911198caac475a0b
-
SSDEEP
6144:T8LxB4D06oRE8vLVI3FPs+DoRRf+Dv4QR/VOxahjMc8Gh/DGIIrlqnh+NG1kXdfu:HJZG+3FPfCRf+JsM1MWh/DFulHPfE9V
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 2332 mspohdk.exe 2692 mspohdk.exe -
Loads dropped DLL 3 IoCs
pid Process 2436 Payment Copy Pdf.exe 2436 Payment Copy Pdf.exe 2332 mspohdk.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3425689832-2386927309-2650718742-1000\Software\Microsoft\Windows\CurrentVersion\Run\FdnCz = "C:\\Users\\Admin\\AppData\\Roaming\\FdnCz\\FdnCz.exe" mspohdk.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 2692 2332 mspohdk.exe 24 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 mspohdk.exe 2692 mspohdk.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2332 mspohdk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2692 mspohdk.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2692 mspohdk.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2332 2436 Payment Copy Pdf.exe 18 PID 2436 wrote to memory of 2332 2436 Payment Copy Pdf.exe 18 PID 2436 wrote to memory of 2332 2436 Payment Copy Pdf.exe 18 PID 2436 wrote to memory of 2332 2436 Payment Copy Pdf.exe 18 PID 2332 wrote to memory of 2692 2332 mspohdk.exe 24 PID 2332 wrote to memory of 2692 2332 mspohdk.exe 24 PID 2332 wrote to memory of 2692 2332 mspohdk.exe 24 PID 2332 wrote to memory of 2692 2332 mspohdk.exe 24 PID 2332 wrote to memory of 2692 2332 mspohdk.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Copy Pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Copy Pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\mspohdk.exe"C:\Users\Admin\AppData\Local\Temp\mspohdk.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\mspohdk.exe"C:\Users\Admin\AppData\Local\Temp\mspohdk.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
334KB
MD5331a88ac8928b2fa36e199191bbfde5d
SHA12785d97e4f46bdde511843bd52143e8dddda9738
SHA256903cb0a45409c7ccf5137f09dae81864681e850ee2cb95a20179ce5cae839d5b
SHA5122419730c93471a81532180b63b416f0972169863f7bbda6e6889609a7ecec2d464f279539a379ac1e49294a4763b2c608c2ce28094e9b214311c3ef34f28cbc2
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08
-
Filesize
165KB
MD59ccc32a41e68c14e82795e6c8563799f
SHA135386cb1b6903372f1fa17acd4db798037b40fa6
SHA256c3efb9a8c063098c0f9a094eebe76f397a8dc74688bd34989814a3897fac5a77
SHA512b293cd93b750fc385c4ddafb3b023fc7e9636a644cc4d7c9a57de5018f98a30464d1f38f3ffd9a8eb003b5f3f390025391d70269b2638ac1afa1d8992182ca08