Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 01:11
Static task
static1
Behavioral task
behavioral1
Sample
Sutarčių analizė-pdf.exe
Resource
win7-20231130-en
Behavioral task
behavioral2
Sample
Sutarčių analizė-pdf.exe
Resource
win10v2004-20231127-en
General
-
Target
Sutarčių analizė-pdf.exe
-
Size
711KB
-
MD5
102714cb47ab0624d79ed174a8231ad6
-
SHA1
8991d7808c89d2c6209322b20ea4a8b75f78fb44
-
SHA256
0da1ad1d456b5b7a028efcbfd9c3ee45af7c6830c87c1e7469faa089dbb0fe7e
-
SHA512
7467ec91c266be688bf97f92a72068bf3271b1c58bf7ded76fce89fa93a8c06d631727b68c4938df57dbab3f0a07a0f6820f3587e87155a77e9d424e288b9bf2
-
SSDEEP
12288:twFGHEOFmZPT0TRoi+kXjhk5na5hylgimtdYM3O0V7bbnL:t5HEOOPOaMd4na2lgZtub0V7z
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini Sutarčių analizė-pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1528 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2428 powershell.exe 1528 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2428 set thread context of 1528 2428 powershell.exe 104 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski Sutarčių analizė-pdf.exe File created C:\Program Files (x86)\cockling.lnk Sutarčių analizė-pdf.exe File opened for modification C:\Program Files (x86)\cockling.lnk Sutarčių analizė-pdf.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod Sutarčių analizė-pdf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk Sutarčių analizė-pdf.exe File opened for modification C:\Windows\Calottes.Doo Sutarčių analizė-pdf.exe File opened for modification C:\Windows\bagvognen.lnk Sutarčių analizė-pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3500 1528 WerFault.exe 104 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 2428 powershell.exe 1528 msbuild.exe 1528 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 1528 msbuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1464 wrote to memory of 2428 1464 Sutarčių analizė-pdf.exe 87 PID 1464 wrote to memory of 2428 1464 Sutarčių analizė-pdf.exe 87 PID 1464 wrote to memory of 2428 1464 Sutarčių analizė-pdf.exe 87 PID 2428 wrote to memory of 1528 2428 powershell.exe 104 PID 2428 wrote to memory of 1528 2428 powershell.exe 104 PID 2428 wrote to memory of 1528 2428 powershell.exe 104 PID 2428 wrote to memory of 1528 2428 powershell.exe 104 PID 2428 wrote to memory of 1528 2428 powershell.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sutarčių analizė-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Sutarčių analizė-pdf.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Preciosity=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Spdlammene\cirka\Buzzardlike\Mavepinerne\Profanenesses.Gru';$Besvorne=$Preciosity.SubString(54587,3);.$Besvorne($Preciosity)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 18644⤵
- Program crash
PID:3500
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1528 -ip 15281⤵PID:372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Colorimetric\Indtappende\Hngekjeeffekt\Fradragendes.Att
Filesize306KB
MD54e478447d9bbee96f0f4363fa03f3646
SHA1ccd297ac9497fda8c12fab076d1871f1241113e8
SHA2563d957ab6b870abeabd8f1c19cb39ed6ca54b6cece2a7d8610826a64c67654fd5
SHA512f1e7db8f2dbc147832c41bb95965cf8d8359b1980a433e9a8325e773d307310538f97349fd0d8ca3658184ea3d46eb5177125117c4b863f490f116938ba71320
-
C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Spdlammene\cirka\Buzzardlike\Mavepinerne\Profanenesses.Gru
Filesize53KB
MD5069fd38747b58c05cc92771b20ff6206
SHA1be3b1d1460ac825103741964b76e1883f59fb8fa
SHA256640d92dda0382f293796ccfc9c51d21da8c24bba7c8c12d8e189c9fdeb4dda64
SHA5121f35e64354054a374215fb5013dcbd3835ae216a999e63736a6aeeb88184cce7c67801be09a9db3f830d50174ccb08d4afc67a21d47f3a889b279d781ba98b57