Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
08-12-2023 02:11
Static task
static1
Behavioral task
behavioral1
Sample
COMANDA FINALAZD33166-pdf.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
COMANDA FINALAZD33166-pdf.exe
Resource
win10v2004-20231201-en
General
-
Target
COMANDA FINALAZD33166-pdf.exe
-
Size
699KB
-
MD5
9444e71802e12684478363233fd62c92
-
SHA1
f2b4bd9162b591b2a2f4202934145864e16053fb
-
SHA256
844d1e148e8c3b897bb0443f74b1bde3da7715e2aeb88d31c8c806da7e447b41
-
SHA512
fec573d2b453086f2ed0b8b11824e4626fb3712134a707f100b9b2704c489fffc1259646979b0c7ebeb032421163b35beed13d2772ac02a7dd08bf7723821805
-
SSDEEP
12288:WwFGHEXEzFGj9F5qx5DJlm2HlzYmdMylgimtdYM3O0V7bbJ:W5HEXl9y1lrz7lgZtub0V7B
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini COMANDA FINALAZD33166-pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2276 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1760 powershell.exe 2276 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 2276 1760 powershell.exe 31 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski COMANDA FINALAZD33166-pdf.exe File created C:\Program Files (x86)\cockling.lnk COMANDA FINALAZD33166-pdf.exe File opened for modification C:\Program Files (x86)\cockling.lnk COMANDA FINALAZD33166-pdf.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod COMANDA FINALAZD33166-pdf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk COMANDA FINALAZD33166-pdf.exe File opened for modification C:\Windows\Calottes.Doo COMANDA FINALAZD33166-pdf.exe File opened for modification C:\Windows\bagvognen.lnk COMANDA FINALAZD33166-pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 1760 powershell.exe 2276 msbuild.exe 2276 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1760 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1760 powershell.exe Token: SeDebugPrivilege 2276 msbuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1760 2928 COMANDA FINALAZD33166-pdf.exe 28 PID 2928 wrote to memory of 1760 2928 COMANDA FINALAZD33166-pdf.exe 28 PID 2928 wrote to memory of 1760 2928 COMANDA FINALAZD33166-pdf.exe 28 PID 2928 wrote to memory of 1760 2928 COMANDA FINALAZD33166-pdf.exe 28 PID 1760 wrote to memory of 2276 1760 powershell.exe 31 PID 1760 wrote to memory of 2276 1760 powershell.exe 31 PID 1760 wrote to memory of 2276 1760 powershell.exe 31 PID 1760 wrote to memory of 2276 1760 powershell.exe 31 PID 1760 wrote to memory of 2276 1760 powershell.exe 31 PID 1760 wrote to memory of 2276 1760 powershell.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\COMANDA FINALAZD33166-pdf.exe"C:\Users\Admin\AppData\Local\Temp\COMANDA FINALAZD33166-pdf.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Obscurantic=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Thermistor\Bruseren.Ple';$Ejendomsselskab=$Obscurantic.SubString(49841,3);.$Ejendomsselskab($Obscurantic)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
299KB
MD5740aba5e4e37d6e24e6322b0fb20b7e7
SHA16b92a45c9b518e1fe51192c27bd81db51f2b90d4
SHA256a47e49459ad8874693970dbe048982e5afd0ffee2644e03a3ac147be2d012609
SHA5122aca469279d46bbfc84fac52ee8ebdf8b58256f9009e7651480bc8d0fb07327107ee71e526783e8553e499f38a4b977de3e3fdadd4bbda9c8df37423a21c81f3
-
Filesize
48KB
MD5b37bbcef093ffdd4c3be4dc919f6e830
SHA15ef5132e6f4021d672ba3844d2542e2258d22b72
SHA2560c0dcc2234bc3f9baf5c35eb8ea2a77ca0e93015a6cb05de69890893a4b6daad
SHA5129e8a8e2b84f366c0fc2edfa43c6781e88f99621549f0564efadd9d8facc975d1bbab048663b7c6e13ff53444d4f98d058664040dd6c67fde01a7500f38f3a9ba