Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-04-2024 10:26
Static task
static1
Behavioral task
behavioral1
Sample
Overdue Account.pdf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Overdue Account.pdf.exe
Resource
win10v2004-20240426-en
General
-
Target
Overdue Account.pdf.exe
-
Size
670KB
-
MD5
81937e479c70381a7527b21693ab3e6c
-
SHA1
fbac04ef1e0315bff71d908496309d731da30c75
-
SHA256
e48b7b9ba50d500f569024126a2ff8981db13525ff378ea2151ce8d6b7e4e452
-
SHA512
35b56dce2a110c145a4c4bef02a5e0151835ea1f1d64891e346f77bf3ce4a3cae2b81f098e819183a2f664f28997845a22b071805e76c97a009b2f6241bbaded
-
SSDEEP
12288:PBB778QJ5RBdmrRwANBlJi/l/XbBzN5L/ObdOC0uCnGbmSAnJGXuY7GzkR:ZBDB0rqclJeNvL/EpV5bmJKu0
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.nooshdaroodc.com - Port:
587 - Username:
[email protected] - Password:
Nou$h@Darou - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 2500 2100 Overdue Account.pdf.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2100 Overdue Account.pdf.exe 2100 Overdue Account.pdf.exe 2100 Overdue Account.pdf.exe 2100 Overdue Account.pdf.exe 2100 Overdue Account.pdf.exe 2100 Overdue Account.pdf.exe 2860 powershell.exe 2552 powershell.exe 2100 Overdue Account.pdf.exe 2500 RegSvcs.exe 2500 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2100 Overdue Account.pdf.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2500 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2552 2100 Overdue Account.pdf.exe 28 PID 2100 wrote to memory of 2552 2100 Overdue Account.pdf.exe 28 PID 2100 wrote to memory of 2552 2100 Overdue Account.pdf.exe 28 PID 2100 wrote to memory of 2552 2100 Overdue Account.pdf.exe 28 PID 2100 wrote to memory of 2860 2100 Overdue Account.pdf.exe 30 PID 2100 wrote to memory of 2860 2100 Overdue Account.pdf.exe 30 PID 2100 wrote to memory of 2860 2100 Overdue Account.pdf.exe 30 PID 2100 wrote to memory of 2860 2100 Overdue Account.pdf.exe 30 PID 2100 wrote to memory of 2452 2100 Overdue Account.pdf.exe 32 PID 2100 wrote to memory of 2452 2100 Overdue Account.pdf.exe 32 PID 2100 wrote to memory of 2452 2100 Overdue Account.pdf.exe 32 PID 2100 wrote to memory of 2452 2100 Overdue Account.pdf.exe 32 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34 PID 2100 wrote to memory of 2500 2100 Overdue Account.pdf.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Overdue Account.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Overdue Account.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Overdue Account.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kpSYqS.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kpSYqS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp646E.tmp"2⤵
- Creates scheduled task(s)
PID:2452
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57b8de2840316f86b9545bfca01d77c5d
SHA14aa58fa175872e8362a8c8c4bbea310153eb86b2
SHA256870b0c30da768eedee29406f166af398d5a892e50e7d1074cd493a0efe5d07b0
SHA5123297748881207e6a14328925e06df1e8577bb4fe0a579301ff6d20ac03fda74ba8f7c22b1741915255bb40762ad401c12bdce01e12996c67750262a343cab889
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\P78O5EEC5UFIP1TUHX0S.temp
Filesize7KB
MD5316342d9caed64b8fe19c7f68b69b4e4
SHA1135a4a49830852320794ca7dc22b11158fe7834e
SHA2569795dd14758277eef9ee1e3fa59095be8f7b61fde2e78d65f49bf9288e2d27b8
SHA512b1d53e4f0bbd21d4c6f6eb17775bf7cafbe89889537a9f6e75f86f648e5aa88a41895a8060eb8ba3251eb262c7bda27e592db42ff83ed4da34904088b6981c49