Analysis

  • max time kernel
    117s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 18:24

General

  • Target

    CEQ084007738830983737820000020002RF_PDF.exe

  • Size

    2.5MB

  • MD5

    ece6f990267fba0e365191d6558b0f9f

  • SHA1

    7841ab811b01ce15915a9df2538ff469656538af

  • SHA256

    105465e8fc8446745fca6287927567949b9c7a41112d4752f9cb98f503f484db

  • SHA512

    b8a1ad5e44e89c3657f05bd5f32859c1479149b5a849059212139c00b4b6410544b5929e17ddc3b4aaea29aa1413ab77bb57e95b30caef1f6a02f838db116a12

  • SSDEEP

    24576:hqCdMP5SdezpyFNrhSCPuoX0k6O2BusxExVJhenLg31+mYGnKBFHJETXHOahJs3:hP6hSrcCPT0JnLg31+mYGnKDKTXe3

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6806295140:AAG4-KC2NA0JDcYhFvVsLTmBeXMXo_2r83w/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CEQ084007738830983737820000020002RF_PDF.exe
    "C:\Users\Admin\AppData\Local\Temp\CEQ084007738830983737820000020002RF_PDF.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath $env:UserProfile
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2404
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2404-15-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-7-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-6-0x0000000002260000-0x0000000002268000-memory.dmp

    Filesize

    32KB

  • memory/2404-5-0x000000001B600000-0x000000001B8E2000-memory.dmp

    Filesize

    2.9MB

  • memory/2404-8-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-9-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/2404-4-0x000007FEF62BE000-0x000007FEF62BF000-memory.dmp

    Filesize

    4KB

  • memory/2404-17-0x000007FEF6000000-0x000007FEF699D000-memory.dmp

    Filesize

    9.6MB

  • memory/3052-14-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-12-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-10-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3052-16-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

    Filesize

    4KB

  • memory/3052-18-0x0000000074A6E000-0x0000000074A6F000-memory.dmp

    Filesize

    4KB