Analysis
-
max time kernel
95s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 07:06
Static task
static1
Behavioral task
behavioral1
Sample
PO Invoice XJ210821Q.PDF.scr.exe
Resource
win7-20240903-en
General
-
Target
PO Invoice XJ210821Q.PDF.scr.exe
-
Size
674KB
-
MD5
b93e5d5b8d6e25ea9107769128334130
-
SHA1
eaa57f101eec3faaa8ca9a767a07e4cdef35999e
-
SHA256
4a88d515600a389b686c2674cb10d053720eab06b16bd6c8ad99e06157980283
-
SHA512
52dfb3178800cf6905ba2e5d4c351a176b3feb531329d5bd7ba3135843dbeacad3814a82eaf3ecdf0e5e47261d7cd3d4043b616a10a2b79c194566fbb33a0657
-
SSDEEP
12288:AO98bQbs8+iS6RGUfSjWFa9Rh1iEIhjz3DO8ITXykKsSWScPx3ZokkR:ArIJ+7dUfSjWA9Rh14Jy8qZuWbx3Zg
Malware Config
Extracted
Protocol: ftp- Host:
ftp.libreriagandhi.cl - Port:
21 - Username:
[email protected] - Password:
x6p2^m#1#~+O
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.libreriagandhi.cl - Port:
21 - Username:
[email protected] - Password:
x6p2^m#1#~+O
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3008 powershell.exe 2792 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation PO Invoice XJ210821Q.PDF.scr.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5004 set thread context of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO Invoice XJ210821Q.PDF.scr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO Invoice XJ210821Q.PDF.scr.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 3008 powershell.exe 2792 powershell.exe 5004 PO Invoice XJ210821Q.PDF.scr.exe 3008 powershell.exe 2792 powershell.exe 116 PO Invoice XJ210821Q.PDF.scr.exe 116 PO Invoice XJ210821Q.PDF.scr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 5004 PO Invoice XJ210821Q.PDF.scr.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe Token: SeDebugPrivilege 116 PO Invoice XJ210821Q.PDF.scr.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 5004 wrote to memory of 3008 5004 PO Invoice XJ210821Q.PDF.scr.exe 91 PID 5004 wrote to memory of 3008 5004 PO Invoice XJ210821Q.PDF.scr.exe 91 PID 5004 wrote to memory of 3008 5004 PO Invoice XJ210821Q.PDF.scr.exe 91 PID 5004 wrote to memory of 2792 5004 PO Invoice XJ210821Q.PDF.scr.exe 93 PID 5004 wrote to memory of 2792 5004 PO Invoice XJ210821Q.PDF.scr.exe 93 PID 5004 wrote to memory of 2792 5004 PO Invoice XJ210821Q.PDF.scr.exe 93 PID 5004 wrote to memory of 2024 5004 PO Invoice XJ210821Q.PDF.scr.exe 94 PID 5004 wrote to memory of 2024 5004 PO Invoice XJ210821Q.PDF.scr.exe 94 PID 5004 wrote to memory of 2024 5004 PO Invoice XJ210821Q.PDF.scr.exe 94 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97 PID 5004 wrote to memory of 116 5004 PO Invoice XJ210821Q.PDF.scr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\zDowlSskSU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\zDowlSskSU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4419.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2024
-
-
C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\PO Invoice XJ210821Q.PDF.scr.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:116
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD52f281910c88067a34aa44e1570fa599e
SHA1ad4563bcb89957ef9f47c20833b24fca61dd4cb8
SHA256e6e580fb9cd8da88028c60c5598fb0a9b5f35eb5c9be111582d15b689c88deb1
SHA512bd63d580f81e792f3855c02b38f3b9b09206f2a48da9353a85a34f69fcbee3a28a376ee1f79631876695892bc57fbabe125ea1bf136a0235a986c6a585321fbb
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD596bcd1493300f2a9f6bf04cb633e1c7b
SHA14f6136bd94daae148079cebb2b5db981e7e04e09
SHA25614dfb484f92f80195e05a3b268e61a63e656fb3f702e0c91be71411bdd31fc06
SHA51253c6a75db1e7b3f20f2c60306d3cbe7b3d7aca5c0663bc7af694238fffcfab797f979698687a74d8c548d47e2c8ca55773fa38daada9cc0f8b17f822a2ea6ee9