Analysis
-
max time kernel
103s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
Resource
win10v2004-20240508-en
General
-
Target
Shipping Documents POV2405023/Shipping Documents POV2405023.xlsx.exe
-
Size
371KB
-
MD5
d94f324b3483803d84eeba84f631ff39
-
SHA1
347ee79e6a0b1c5151d94a2492bea9281d0eae01
-
SHA256
5795f7ad5151237b31b31a6c35f05cc84795d215a8cf5483f088a986f8d97447
-
SHA512
07167cc578a71a000cbe5b4fc778acf130dde1d063f4c425aa6cdbc7ac6c4257ba1c378abdea3f4d8a7555aa0894241f66da1ddde790ece8d4f578515136b4e5
-
SSDEEP
6144:rtJigmu6zKJXHkNk29y1yfDME9L0I/HKq6AlclSCIm5chd9ocC7e5I1BA:vigmpzKJXHz2U1yV0ICq6scI7C7GX
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7078346326:AAGX1CDPoWJfjkrOoEPVVRU8q_dn7nh6dRU/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adobe = "C:\\Users\\Admin\\AppData\\Roaming\\adobe\\adobe.exe" Shipping Documents POV2405023.xlsx.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 15 api.ipify.org 14 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription pid process target process PID 3524 set thread context of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exepid process 376 Shipping Documents POV2405023.xlsx.exe 376 Shipping Documents POV2405023.xlsx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription pid process Token: SeDebugPrivilege 376 Shipping Documents POV2405023.xlsx.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exepid process 376 Shipping Documents POV2405023.xlsx.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Shipping Documents POV2405023.xlsx.exedescription pid process target process PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe PID 3524 wrote to memory of 376 3524 Shipping Documents POV2405023.xlsx.exe Shipping Documents POV2405023.xlsx.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents POV2405023\Shipping Documents POV2405023.xlsx.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:376