Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-03-2024 13:22
Static task
static1
Behavioral task
behavioral1
Sample
quotation#247833.pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
quotation#247833.pdf.exe
Resource
win10v2004-20240226-en
General
-
Target
quotation#247833.pdf.exe
-
Size
612KB
-
MD5
52bbe58331758dd37f776189080a5ead
-
SHA1
2542cfdfee6da01c4657c13b3327ebf6f91d42da
-
SHA256
825a37255a61598eaa9eb15897dbc89f7e3637193c4e17775fbbc145ca523528
-
SHA512
a99a78ccc4ccc8fd2797d4f2f2c766c9043dd1dbbc7a588680d0472c43c44a78e31212c38f1753196cf0609e65b079b12656a59a934ae36ed4ff3e4f9312e5b8
-
SSDEEP
12288:S5+SDlnIqMoroxB4559YxaxO2b0NJk+mYRSn9//kcCR8gyn8M4Rxg:CzM7xy559YxaxT0NJkiRU+cCR8VD4fg
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
email.globeauto.in - Port:
587 - Username:
[email protected] - Password:
Mohali@@1# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 2464 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" quotation#247833.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2464 set thread context of 2492 2464 svchost.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2920 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2676 timeout.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2984 quotation#247833.pdf.exe 2984 quotation#247833.pdf.exe 2984 quotation#247833.pdf.exe 2492 jsc.exe 2492 jsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2984 quotation#247833.pdf.exe Token: SeDebugPrivilege 2464 svchost.exe Token: SeDebugPrivilege 2492 jsc.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2984 wrote to memory of 1168 2984 quotation#247833.pdf.exe 28 PID 2984 wrote to memory of 1168 2984 quotation#247833.pdf.exe 28 PID 2984 wrote to memory of 1168 2984 quotation#247833.pdf.exe 28 PID 2984 wrote to memory of 2648 2984 quotation#247833.pdf.exe 29 PID 2984 wrote to memory of 2648 2984 quotation#247833.pdf.exe 29 PID 2984 wrote to memory of 2648 2984 quotation#247833.pdf.exe 29 PID 2648 wrote to memory of 2676 2648 cmd.exe 32 PID 2648 wrote to memory of 2676 2648 cmd.exe 32 PID 2648 wrote to memory of 2676 2648 cmd.exe 32 PID 1168 wrote to memory of 2920 1168 cmd.exe 33 PID 1168 wrote to memory of 2920 1168 cmd.exe 33 PID 1168 wrote to memory of 2920 1168 cmd.exe 33 PID 2648 wrote to memory of 2464 2648 cmd.exe 34 PID 2648 wrote to memory of 2464 2648 cmd.exe 34 PID 2648 wrote to memory of 2464 2648 cmd.exe 34 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2612 2464 svchost.exe 35 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2492 2464 svchost.exe 36 PID 2464 wrote to memory of 2476 2464 svchost.exe 37 PID 2464 wrote to memory of 2476 2464 svchost.exe 37 PID 2464 wrote to memory of 2476 2464 svchost.exe 37 PID 2464 wrote to memory of 2476 2464 svchost.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\quotation#247833.pdf.exe"C:\Users\Admin\AppData\Local\Temp\quotation#247833.pdf.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2920
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp533E.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2676
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"4⤵PID:2612
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe"4⤵PID:2476
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD573b91d7cfae897287dd267ed8031804f
SHA1431a2be8e29ca015d21bfb3117e779dc9192dce4
SHA2564f864048266051d286ac061d312ded0f4fceb500efebb84dea41e9c8dafc774e
SHA512fe99e437c2948f3a6875fe5284108ef2b98b6a8065c9a2795e84dcc4162bc4e0f9e491706683f0123b56ede370bbc5ca591ef2c378e25c147937eb0d4b37e8f7
-
Filesize
612KB
MD552bbe58331758dd37f776189080a5ead
SHA12542cfdfee6da01c4657c13b3327ebf6f91d42da
SHA256825a37255a61598eaa9eb15897dbc89f7e3637193c4e17775fbbc145ca523528
SHA512a99a78ccc4ccc8fd2797d4f2f2c766c9043dd1dbbc7a588680d0472c43c44a78e31212c38f1753196cf0609e65b079b12656a59a934ae36ed4ff3e4f9312e5b8