Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/04/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
Dhl Express Shipping Docs .pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Dhl Express Shipping Docs .pdf.exe
Resource
win10v2004-20240412-en
General
-
Target
Dhl Express Shipping Docs .pdf.exe
-
Size
835KB
-
MD5
e7d52516ca8bcf4e8bcaf71a36a88300
-
SHA1
d5a7eaad95ab6d4e492b128db0cf550c34170c90
-
SHA256
8df5ecbc8ea978c98c9c3a0918fe9ee233f169ee9e3d38855b7da8fc96aad8dc
-
SHA512
0dc86396301012e035ed03086436411b5abdbe7c2dc84b03d5385739250bf1efa1bc6fab96471eb277b62d7a3b1ea663565809493a26750951c6316b131c0751
-
SSDEEP
12288:+iEx72xrdlMXGnWnpLCzRdoJ6K5/w6ovt51qZ0o1LFMdDP+FIk7N:sSrdrWn4z26UNol510LFMdDP8Ik
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
u(!IUDW7 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2560 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 Dhl Express Shipping Docs .pdf.exe 2580 powershell.exe 2576 powershell.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe 2236 Dhl Express Shipping Docs .pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2236 Dhl Express Shipping Docs .pdf.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 2576 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2576 2236 Dhl Express Shipping Docs .pdf.exe 28 PID 2236 wrote to memory of 2576 2236 Dhl Express Shipping Docs .pdf.exe 28 PID 2236 wrote to memory of 2576 2236 Dhl Express Shipping Docs .pdf.exe 28 PID 2236 wrote to memory of 2576 2236 Dhl Express Shipping Docs .pdf.exe 28 PID 2236 wrote to memory of 2580 2236 Dhl Express Shipping Docs .pdf.exe 30 PID 2236 wrote to memory of 2580 2236 Dhl Express Shipping Docs .pdf.exe 30 PID 2236 wrote to memory of 2580 2236 Dhl Express Shipping Docs .pdf.exe 30 PID 2236 wrote to memory of 2580 2236 Dhl Express Shipping Docs .pdf.exe 30 PID 2236 wrote to memory of 2560 2236 Dhl Express Shipping Docs .pdf.exe 32 PID 2236 wrote to memory of 2560 2236 Dhl Express Shipping Docs .pdf.exe 32 PID 2236 wrote to memory of 2560 2236 Dhl Express Shipping Docs .pdf.exe 32 PID 2236 wrote to memory of 2560 2236 Dhl Express Shipping Docs .pdf.exe 32 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34 PID 2236 wrote to memory of 2736 2236 Dhl Express Shipping Docs .pdf.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Dhl Express Shipping Docs .pdf.exe"C:\Users\Admin\AppData\Local\Temp\Dhl Express Shipping Docs .pdf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Dhl Express Shipping Docs .pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\emaGqYHYeYNHas.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\emaGqYHYeYNHas" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5A60.tmp"2⤵
- Creates scheduled task(s)
PID:2560
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5649cbcd1ca2c6c28837821fee226ecff
SHA1f8518fdbb28c4919357f96c522f234a74acc0b57
SHA2567c8633381afbe7003c13e0d374d005e98e3eaa0adffee25f10f24747b022804d
SHA512573798dea18914ebb5e66e8165bd6c87b28b8563f5aac8c741748b83006efcf2843d4ad73200d74e411f17d87f309242bfd63ab66bff7e9df59a875873cf7e5d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d8c018d4ecfb6d1ea8211d85b7723d04
SHA16033059554574510145f29c85eab7990b30dc32f
SHA256325b80aaa5a03d736e5ec748586d0f8251efaf49693a89b9a1eb603ac4e57c6b
SHA512c3f2b3d3a1280bece8c8824fc0876b57fbd7727ba08ad550259fdf94973a552e2a9be27fcd07a77e2f59e781693023edf39b84d8d468daba8e2c903943113f74