Analysis

  • max time kernel
    136s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 01:05

General

  • Target

    INVOICE & AWB #5021485_pdf.exe

  • Size

    1.2MB

  • MD5

    c661e256cfb632d80724101a5f636d0a

  • SHA1

    373d820d6de6e2b12f0c93919a7459c73d778e68

  • SHA256

    a5469f28edbcd739343cc080853d0929dec5e2ee90cba53880a0b4f1f347c429

  • SHA512

    0bf33f2c79236f88ccd3065a1b8791173105551c74c23be26a87bd31095c27743026b72ee4defd7cab22c2ee9b9f4f9c46d1f3d44a1ccbd22ebc98025dfaadaa

  • SSDEEP

    24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8adaR8EdniRKBmYk43:/TvC/MTQYxsWR7ad88Snqcmg

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Credentials from Password Stores: Credentials from Web Browsers 1 TTPs

    Malicious Access or copy of Web Browser Credential store.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\INVOICE & AWB #5021485_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\INVOICE & AWB #5021485_pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3784
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\INVOICE & AWB #5021485_pdf.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4296
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3784 -s 724
      2⤵
      • Program crash
      PID:4804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3784 -ip 3784
    1⤵
      PID:4788

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\aut8FAD.tmp

      Filesize

      261KB

      MD5

      a510f161de49abd5e87d4a0a2457e25f

      SHA1

      284c2743100e76615c0c6c8689a9f9201328f066

      SHA256

      363b3acebd2be75921e1074acd63d36233abb82d4e45386822463a6c0ef736e3

      SHA512

      0b401ab1f5fbd6c405bacb640315c8001c7e152532eac548ca067843b621d0b74ef184ca3be610ed3034f71d7dcdb60c1abfe96241e6ec9130c98d16818ba3e3

    • memory/3784-13-0x0000000003E40000-0x0000000003E44000-memory.dmp

      Filesize

      16KB

    • memory/4296-14-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4296-15-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4296-16-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4296-17-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4296-18-0x00000000740CE000-0x00000000740CF000-memory.dmp

      Filesize

      4KB

    • memory/4296-19-0x0000000003060000-0x00000000030B4000-memory.dmp

      Filesize

      336KB

    • memory/4296-20-0x00000000740C0000-0x0000000074870000-memory.dmp

      Filesize

      7.7MB

    • memory/4296-21-0x0000000005CC0000-0x0000000006264000-memory.dmp

      Filesize

      5.6MB

    • memory/4296-22-0x00000000740C0000-0x0000000074870000-memory.dmp

      Filesize

      7.7MB

    • memory/4296-23-0x00000000056B0000-0x0000000005702000-memory.dmp

      Filesize

      328KB

    • memory/4296-24-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-40-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-55-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-79-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-83-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-81-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-77-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-75-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-73-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-71-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-69-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-67-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-65-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-63-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-61-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-59-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-57-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-53-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-51-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-49-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-47-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-46-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-43-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-41-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-37-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-35-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-33-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-31-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-29-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-27-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-25-0x00000000056B0000-0x00000000056FC000-memory.dmp

      Filesize

      304KB

    • memory/4296-1056-0x00000000058C0000-0x0000000005926000-memory.dmp

      Filesize

      408KB

    • memory/4296-1057-0x00000000740C0000-0x0000000074870000-memory.dmp

      Filesize

      7.7MB

    • memory/4296-1058-0x0000000006C00000-0x0000000006C50000-memory.dmp

      Filesize

      320KB

    • memory/4296-1059-0x0000000006CF0000-0x0000000006D82000-memory.dmp

      Filesize

      584KB

    • memory/4296-1060-0x0000000006C60000-0x0000000006C6A000-memory.dmp

      Filesize

      40KB

    • memory/4296-1061-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/4296-1062-0x00000000740CE000-0x00000000740CF000-memory.dmp

      Filesize

      4KB

    • memory/4296-1063-0x00000000740C0000-0x0000000074870000-memory.dmp

      Filesize

      7.7MB