Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 06:28
Static task
static1
Behavioral task
behavioral1
Sample
FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe
Resource
win10v2004-20240802-en
General
-
Target
FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe
-
Size
821KB
-
MD5
87113dcc0719f80633c986c184c7e29f
-
SHA1
9033d77c48bf796483bf8ba448bfd09aaaf162a1
-
SHA256
3ab5cfa98e47af08a289ebfb6bfcdb40b109ac077c1b655b47798cb559931724
-
SHA512
d6d7c62ca6d08f3fdad5ee4405882707d4d8ecbd8684067e85195b603a14a8c36b3ec5fd4b1dfe6a08d923ae56e4cb75ca350723159615b9a53752a57db38f30
-
SSDEEP
24576:UfT2Hd8Vr98Fl0Yu/d4NOuhPpkBfJXAvR:UfTUd8VJ8Fl0YZpCBfJXAJ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2840 powershell.exe 2712 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2084 set thread context of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2968 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 1864 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 1864 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 2712 powershell.exe 2840 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe Token: SeDebugPrivilege 1864 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe Token: SeDebugPrivilege 2712 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2712 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 31 PID 2084 wrote to memory of 2712 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 31 PID 2084 wrote to memory of 2712 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 31 PID 2084 wrote to memory of 2712 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 31 PID 2084 wrote to memory of 2840 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 33 PID 2084 wrote to memory of 2840 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 33 PID 2084 wrote to memory of 2840 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 33 PID 2084 wrote to memory of 2840 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 33 PID 2084 wrote to memory of 2968 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 34 PID 2084 wrote to memory of 2968 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 34 PID 2084 wrote to memory of 2968 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 34 PID 2084 wrote to memory of 2968 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 34 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37 PID 2084 wrote to memory of 1864 2084 FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe"C:\Users\Admin\AppData\Local\Temp\FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TKFJVphocGEKC.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TKFJVphocGEKC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5957.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe"C:\Users\Admin\AppData\Local\Temp\FabricWW1580DPEBO12SDCSeptemberBuy.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a9671ec37a4565553575d0d08a46bb52
SHA1fc4272c0f50eb4a78c5e4c091802aba186ed2fea
SHA256c9c56172ef9d1b9eaaca01f83f730d3aec262e9e40986de08b84bb7e254d4e03
SHA51266bf14df3c33c20dd16d9660761ad9d7c18e713270cdc4622c35ff6d4ec27fa70bf1ff578173228728cbefb45a29abc7a214656a0d1b3f58bd428422ee408ac5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6160A189WUAL5OWHFT67.temp
Filesize7KB
MD595a71fbd3925d39ce3a0ddfd0001fa55
SHA1b85d0b0bc389aa726de7584b349946965c8d6dcf
SHA25612997e232b5b323c59c2ffa53d964108575b27ff74dcb1be7dd0ca1767bf028a
SHA5129c5a5f88854574b4c7d9f35c002a17cb3777ab64b191c404e7a2a7b167f0e23ebf568d170e08c9c32106a18bb5baf99ac2d978f03070a479db642e0f465dddf2