Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2023 13:00
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe
Resource
win7-20231020-en
General
-
Target
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe
-
Size
668KB
-
MD5
9119bc707a33a35acdaf7b200c333114
-
SHA1
6e61a99702917a3a0a81ba7533955c08e2b62904
-
SHA256
df7306e9804b036951292e2a2475f14ac6a14294ddd7d17df9f0442e4a8e28c7
-
SHA512
034c30c5ea354c6d1b8cc37efca124af157345e7f6d2f48a01d7aa54e9e27d113b2b8b248fa139fc28694c9ae348ba1f053dda5b125f19fc314e6accd532aed8
-
SSDEEP
12288:13Vz+4WpAEry7469rISXDopXuGPU5XULMpVN8+iLdYhGgQV+2hp8LU2Wwg+:4pAE3697XDQvGULMp3kLdYhvQVTpq
Malware Config
Extracted
agenttesla
https://discord.com/api/webhooks/1181759713713602600/iHsQ6OYa_KMNpOIA7OYiDu7j9BWVVvJ0gcEWr8VRve7tDH1TR5LRILIK1jr1NG5T-29a
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral2/memory/180-6-0x0000000005060000-0x0000000005078000-memory.dmp family_zgrat_v1 -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exedescription pid process target process PID 180 set thread context of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exepid process 4624 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe 4624 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe 4624 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exedescription pid process Token: SeDebugPrivilege 4624 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exepid process 4624 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exedescription pid process target process PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe PID 180 wrote to memory of 4624 180 Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Enquiry-Y97STVZCPZC12AQ-03315904351-pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4624