Analysis
-
max time kernel
52s -
max time network
111s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
PO Invoice XJ210821Q.PDF.scr.exe
Resource
win7-20240903-en
General
-
Target
PO Invoice XJ210821Q.PDF.scr.exe
-
Size
674KB
-
MD5
b93e5d5b8d6e25ea9107769128334130
-
SHA1
eaa57f101eec3faaa8ca9a767a07e4cdef35999e
-
SHA256
4a88d515600a389b686c2674cb10d053720eab06b16bd6c8ad99e06157980283
-
SHA512
52dfb3178800cf6905ba2e5d4c351a176b3feb531329d5bd7ba3135843dbeacad3814a82eaf3ecdf0e5e47261d7cd3d4043b616a10a2b79c194566fbb33a0657
-
SSDEEP
12288:AO98bQbs8+iS6RGUfSjWFa9Rh1iEIhjz3DO8ITXykKsSWScPx3ZokkR:ArIJ+7dUfSjWA9Rh14Jy8qZuWbx3Zg
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.libreriagandhi.cl - Port:
21 - Username:
[email protected] - Password:
x6p2^m#1#~+O
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2684 powershell.exe 2788 powershell.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3048 set thread context of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO Invoice XJ210821Q.PDF.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO Invoice XJ210821Q.PDF.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 3048 PO Invoice XJ210821Q.PDF.scr.exe 972 PO Invoice XJ210821Q.PDF.scr.exe 972 PO Invoice XJ210821Q.PDF.scr.exe 2684 powershell.exe 2788 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3048 PO Invoice XJ210821Q.PDF.scr.exe Token: SeDebugPrivilege 972 PO Invoice XJ210821Q.PDF.scr.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2684 3048 PO Invoice XJ210821Q.PDF.scr.exe 29 PID 3048 wrote to memory of 2684 3048 PO Invoice XJ210821Q.PDF.scr.exe 29 PID 3048 wrote to memory of 2684 3048 PO Invoice XJ210821Q.PDF.scr.exe 29 PID 3048 wrote to memory of 2684 3048 PO Invoice XJ210821Q.PDF.scr.exe 29 PID 3048 wrote to memory of 2788 3048 PO Invoice XJ210821Q.PDF.scr.exe 31 PID 3048 wrote to memory of 2788 3048 PO Invoice XJ210821Q.PDF.scr.exe 31 PID 3048 wrote to memory of 2788 3048 PO Invoice XJ210821Q.PDF.scr.exe 31 PID 3048 wrote to memory of 2788 3048 PO Invoice XJ210821Q.PDF.scr.exe 31 PID 3048 wrote to memory of 2696 3048 PO Invoice XJ210821Q.PDF.scr.exe 33 PID 3048 wrote to memory of 2696 3048 PO Invoice XJ210821Q.PDF.scr.exe 33 PID 3048 wrote to memory of 2696 3048 PO Invoice XJ210821Q.PDF.scr.exe 33 PID 3048 wrote to memory of 2696 3048 PO Invoice XJ210821Q.PDF.scr.exe 33 PID 3048 wrote to memory of 1740 3048 PO Invoice XJ210821Q.PDF.scr.exe 35 PID 3048 wrote to memory of 1740 3048 PO Invoice XJ210821Q.PDF.scr.exe 35 PID 3048 wrote to memory of 1740 3048 PO Invoice XJ210821Q.PDF.scr.exe 35 PID 3048 wrote to memory of 1740 3048 PO Invoice XJ210821Q.PDF.scr.exe 35 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36 PID 3048 wrote to memory of 972 3048 PO Invoice XJ210821Q.PDF.scr.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2684
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zDowlSskSU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zDowlSskSU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA554.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"2⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:972
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD587945b6f768e1dd5a049a2769c8c765d
SHA1d3a9718a9c1ff58137fb9d6f3c3141083e63c88c
SHA2566e3d1a02b41ff065a8a1a23c43537a0ca467d51589d5565a198e8ffc2bd1c1ab
SHA51289f967351dcb52b557b1624b4b3882d7e6aa3d9c890fbe159b8926f8efedb1438df4ec6039b412899fd723cd47260046df162205c9535da45ba11d1a451feaa3
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\V4Y5QUE0TB7BSJG5QGFV.temp
Filesize7KB
MD59905922065b7d60ee81f4804191e004a
SHA1f89e8a4ede16ec48d848d82868658316025614b4
SHA256d86759ea98a1809530d24c91399ff1401f62b73588bb7f0a25291a7ac8c10c72
SHA5127edc971a6830ac01bcb064d911c6db5f1be3a91815bb0c75a08904f8ecabbad5662d1b7940e3185992c87cd300f5a24b6ac467092df6045c7d494467edf7a72a