Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
SINAR TORAJA PARTICULARS.pdf.scr
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
SINAR TORAJA PARTICULARS.pdf.scr
Resource
win10v2004-20240426-en
General
-
Target
SINAR TORAJA PARTICULARS.pdf.scr
-
Size
670KB
-
MD5
c5a0ba17188d0ecf5f6952841b5228d3
-
SHA1
a56118c862235208b608b88c6da4a925d6e0ff3a
-
SHA256
17eeb291958feacdd246e605d777ce98fc9be320fd378283ac2764f1bc3b4c25
-
SHA512
884853fa3170151fdac122e9e3536a1cbd48cda2a9de7325ac80f3d8d501d9846736384e62047ac1e1b0b8cc74be26356bcc05639219929d751f563137f30d87
-
SSDEEP
12288:4D67tMcRHg4tHiYOH3KvXRM80k8Zv+JaqSIKXOF+ZHYCccwJ68QnGh:FMcR9HyX+BM80kQEaLpOF+tYCVnn
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://beirutrest.com - Port:
21 - Username:
[email protected] - Password:
9yXQ39wz(uL+
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SINAR TORAJA PARTICULARS.pdf.scrdescription pid process target process PID 2204 set thread context of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SINAR TORAJA PARTICULARS.pdf.scrpid process 2572 SINAR TORAJA PARTICULARS.pdf.scr 2572 SINAR TORAJA PARTICULARS.pdf.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SINAR TORAJA PARTICULARS.pdf.scrdescription pid process Token: SeDebugPrivilege 2572 SINAR TORAJA PARTICULARS.pdf.scr -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
SINAR TORAJA PARTICULARS.pdf.scrdescription pid process target process PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr PID 2204 wrote to memory of 2572 2204 SINAR TORAJA PARTICULARS.pdf.scr SINAR TORAJA PARTICULARS.pdf.scr
Processes
-
C:\Users\Admin\AppData\Local\Temp\SINAR TORAJA PARTICULARS.pdf.scr"C:\Users\Admin\AppData\Local\Temp\SINAR TORAJA PARTICULARS.pdf.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\SINAR TORAJA PARTICULARS.pdf.scr"C:\Users\Admin\AppData\Local\Temp\SINAR TORAJA PARTICULARS.pdf.scr"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-