Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
51 Electronic Invoicing .pdf.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
51 Electronic Invoicing .pdf.exe
Resource
win10v2004-20240508-en
General
-
Target
51 Electronic Invoicing .pdf.exe
-
Size
1.0MB
-
MD5
5165e5022c628f4d08a5428b1d009dd4
-
SHA1
2c63ec13ac0d1908065fccd7df99a7f7d0c18e71
-
SHA256
7ee8c32970f34719127d9ed8087396dd00975d2b17186c1b1915385d246cdfd4
-
SHA512
3d17b7492fe141a8ed2d2aa10bc0b5e7500d660dce3f06f818f271b098b9e0b250c4068419faea6a051ab708ef0c6b6a186fb7337cfacc04e8f561824adfb019
-
SSDEEP
24576:0AHnh+eWsN3skA4RV1Hom2KXMmHaUA9ItV1ONS5:Dh+ZkldoPK8YaUA6tVb
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abanengineering.com - Port:
587 - Username:
[email protected] - Password:
Shah@123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\ZxAzv = "C:\\Users\\Admin\\AppData\\Roaming\\ZxAzv\\ZxAzv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
51 Electronic Invoicing .pdf.exedescription pid process target process PID 3020 set thread context of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 2984 RegSvcs.exe 2984 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
51 Electronic Invoicing .pdf.exepid process 3020 51 Electronic Invoicing .pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2984 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
51 Electronic Invoicing .pdf.exepid process 3020 51 Electronic Invoicing .pdf.exe 3020 51 Electronic Invoicing .pdf.exe -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
51 Electronic Invoicing .pdf.exepid process 3020 51 Electronic Invoicing .pdf.exe 3020 51 Electronic Invoicing .pdf.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
51 Electronic Invoicing .pdf.exedescription pid process target process PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe PID 3020 wrote to memory of 2984 3020 51 Electronic Invoicing .pdf.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51 Electronic Invoicing .pdf.exe"C:\Users\Admin\AppData\Local\Temp\51 Electronic Invoicing .pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\51 Electronic Invoicing .pdf.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-