Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
09-09-2024 08:29
Static task
static1
Behavioral task
behavioral1
Sample
CG230511007 double ring.pdf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
CG230511007 double ring.pdf.exe
Resource
win10v2004-20240802-en
General
-
Target
CG230511007 double ring.pdf.exe
-
Size
698KB
-
MD5
4a2d8f6fac5f95fc384c689d9a5927a2
-
SHA1
97ad59b9532706d2457eb10f6902b5e2f9442566
-
SHA256
44c35217277fbfdde4251ac9c9bad106247b6f5ca5ca0f1dbaf8f3343b364af0
-
SHA512
43d2340d3f49c138b9c0f880617f4f730837c8983fa4a254b16ecbaa5dfef38c1643a657cf04962e9897c56fa561ede9181e3be23d24510e8cf9e186bf77cdd2
-
SSDEEP
12288:FzjLf30WH0IieBhVpz60zapdl4VOqXEkOdu+VGBecnFj8AzPmZ:djj0yyeb/5+lfk8iFFj8MPm
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.iaa-airferight.com - Port:
587 - Username:
[email protected] - Password:
manlikeyou88 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2932 powershell.exe 2936 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 3016 2188 CG230511007 double ring.pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CG230511007 double ring.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CG230511007 double ring.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2188 CG230511007 double ring.pdf.exe 2188 CG230511007 double ring.pdf.exe 3016 CG230511007 double ring.pdf.exe 3016 CG230511007 double ring.pdf.exe 2936 powershell.exe 2932 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2188 CG230511007 double ring.pdf.exe Token: SeDebugPrivilege 3016 CG230511007 double ring.pdf.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 2936 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2936 2188 CG230511007 double ring.pdf.exe 30 PID 2188 wrote to memory of 2936 2188 CG230511007 double ring.pdf.exe 30 PID 2188 wrote to memory of 2936 2188 CG230511007 double ring.pdf.exe 30 PID 2188 wrote to memory of 2936 2188 CG230511007 double ring.pdf.exe 30 PID 2188 wrote to memory of 2932 2188 CG230511007 double ring.pdf.exe 32 PID 2188 wrote to memory of 2932 2188 CG230511007 double ring.pdf.exe 32 PID 2188 wrote to memory of 2932 2188 CG230511007 double ring.pdf.exe 32 PID 2188 wrote to memory of 2932 2188 CG230511007 double ring.pdf.exe 32 PID 2188 wrote to memory of 2368 2188 CG230511007 double ring.pdf.exe 33 PID 2188 wrote to memory of 2368 2188 CG230511007 double ring.pdf.exe 33 PID 2188 wrote to memory of 2368 2188 CG230511007 double ring.pdf.exe 33 PID 2188 wrote to memory of 2368 2188 CG230511007 double ring.pdf.exe 33 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36 PID 2188 wrote to memory of 3016 2188 CG230511007 double ring.pdf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2936
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tjrOWyCGkiBRP.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tjrOWyCGkiBRP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2BE1.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"C:\Users\Admin\AppData\Local\Temp\CG230511007 double ring.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a4ffccd44dec85b803dc80d4134d8dde
SHA16d53cc032f2183cbf4c8d4639dc59ed516288d93
SHA25646f4bf8431ee58cf9709e7d788a69ddacf9211f2e5cf0c05c8a121d0fc6c7075
SHA512796fa504ea6cbe1a82e49fd1012af8720b0843225b84f6df741ca91de8fd6734904fa070db5e28a565d7ed03587fb838ff25ac1a9da0d9eaa123866394699667
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD596ef988315ee74c0da949cf5037f360c
SHA1f6ac2011b6e89aa2cad7f15a0e413d898c5be69a
SHA256869a094420a56fa962316216ba76c7f55e908065e9708b2d3f3d646380a63d35
SHA512c6c4b53fe95e7a5e7f9c4b90dbb14a8a0e78cfba00de9f0559dcaf13e144e088d74682d100629189c4d1a67a41edefa45d988a63f3da4379c6f7571b5ac75f37