Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
CG230511007 double ring.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
CG230511007 double ring.pdf.exe
Resource
win10v2004-20240802-en
General
-
Target
CG230511007 double ring.pdf.exe
-
Size
698KB
-
MD5
4a2d8f6fac5f95fc384c689d9a5927a2
-
SHA1
97ad59b9532706d2457eb10f6902b5e2f9442566
-
SHA256
44c35217277fbfdde4251ac9c9bad106247b6f5ca5ca0f1dbaf8f3343b364af0
-
SHA512
43d2340d3f49c138b9c0f880617f4f730837c8983fa4a254b16ecbaa5dfef38c1643a657cf04962e9897c56fa561ede9181e3be23d24510e8cf9e186bf77cdd2
-
SSDEEP
12288:FzjLf30WH0IieBhVpz60zapdl4VOqXEkOdu+VGBecnFj8AzPmZ:djj0yyeb/5+lfk8iFFj8MPm
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2928 powershell.exe 2580 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2668 set thread context of 2572 2668 CG230511007 double ring.pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CG230511007 double ring.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CG230511007 double ring.pdf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2668 CG230511007 double ring.pdf.exe 2668 CG230511007 double ring.pdf.exe 2572 CG230511007 double ring.pdf.exe 2572 CG230511007 double ring.pdf.exe 2928 powershell.exe 2580 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2668 CG230511007 double ring.pdf.exe Token: SeDebugPrivilege 2572 CG230511007 double ring.pdf.exe Token: SeDebugPrivilege 2928 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2928 2668 CG230511007 double ring.pdf.exe 30 PID 2668 wrote to memory of 2928 2668 CG230511007 double ring.pdf.exe 30 PID 2668 wrote to memory of 2928 2668 CG230511007 double ring.pdf.exe 30 PID 2668 wrote to memory of 2928 2668 CG230511007 double ring.pdf.exe 30 PID 2668 wrote to memory of 2580 2668 CG230511007 double ring.pdf.exe 32 PID 2668 wrote to memory of 2580 2668 CG230511007 double ring.pdf.exe 32 PID 2668 wrote to memory of 2580 2668 CG230511007 double ring.pdf.exe 32 PID 2668 wrote to memory of 2580 2668 CG230511007 double ring.pdf.exe 32 PID 2668 wrote to memory of 2728 2668 CG230511007 double ring.pdf.exe 33 PID 2668 wrote to memory of 2728 2668 CG230511007 double ring.pdf.exe 33 PID 2668 wrote to memory of 2728 2668 CG230511007 double ring.pdf.exe 33 PID 2668 wrote to memory of 2728 2668 CG230511007 double ring.pdf.exe 33 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36 PID 2668 wrote to memory of 2572 2668 CG230511007 double ring.pdf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tjrOWyCGkiBRP.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjrOWyCGkiBRP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp89C9.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD567b81b683937a3b56558e11bc3a8eba0
SHA15e9ca4ae29e0d25deef1aec4ebdfe68bfa9b6c59
SHA25602b9dcdbe384508137704e5570ff7db9883e41e9cb06927c50301d2aeda91869
SHA512a548cd63099bbb83cb26de83799c08ead19469badcaa25f3d3a2310d81a4e083c9c8ab8596f32a837217ad64dbf3146acf853aeabab171d75bd772bc60ae359a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\B0SW84093J19RFO3BPQ1.temp
Filesize7KB
MD5c3108ffad1140f3584e4ab9f8495bdbd
SHA1489fc42df36c8dd4d7fa6be0fe7864e192e05fdd
SHA2567c56bf6603940ec96c22ff96836ee4609ed9b58f4070c4ab6d3bf567b0d56425
SHA51255edcaafaa47078715e88ed10b57dab4f477f89d25ea8328a43e9bd79042b8113402d0afcac3cd2c4e20b0b98a3109a7452ceeb16dcd5cd5b49467c82f24f6d3