Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
Resource
win10v2004-20240508-en
General
-
Target
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
-
Size
371KB
-
MD5
d94f324b3483803d84eeba84f631ff39
-
SHA1
347ee79e6a0b1c5151d94a2492bea9281d0eae01
-
SHA256
5795f7ad5151237b31b31a6c35f05cc84795d215a8cf5483f088a986f8d97447
-
SHA512
07167cc578a71a000cbe5b4fc778acf130dde1d063f4c425aa6cdbc7ac6c4257ba1c378abdea3f4d8a7555aa0894241f66da1ddde790ece8d4f578515136b4e5
-
SSDEEP
6144:rtJigmu6zKJXHkNk29y1yfDME9L0I/HKq6AlclSCIm5chd9ocC7e5I1BA:vigmpzKJXHz2U1yV0ICq6scI7C7GX
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7078346326:AAGX1CDPoWJfjkrOoEPVVRU8q_dn7nh6dRU/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-268080393-3149932598-1824759070-1000\Software\Microsoft\Windows\CurrentVersion\Run\adobe = "C:\\Users\\Admin\\AppData\\Roaming\\adobe\\adobe.exe" Shipping Documents POV2405023.xlsx.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription pid process target process PID 1712 set thread context of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exepid process 2196 Shipping Documents POV2405023.xlsx.exe 2196 Shipping Documents POV2405023.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription pid process Token: SeDebugPrivilege 2196 Shipping Documents POV2405023.xlsx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exepid process 2196 Shipping Documents POV2405023.xlsx.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription pid process target process PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 1712 wrote to memory of 2196 1712 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2196
-