Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
Resource
win7-20240903-en
General
-
Target
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
-
Size
1.1MB
-
MD5
1ca01a88b80112024883e55a27b1345a
-
SHA1
3fdcd8cd1ff882b9c76dd93f680bb7f60fc97c7d
-
SHA256
a848e5d8d3a080b81556f4f7ec1fe1103610bf7bbb023065bf2e6696abaf6769
-
SHA512
9f978fe421c5217bccf787df0a105f584cd945be1f43e77f1971d688becaa9682a01acf7585b6bcaf4111103835dbcaa2caef59ccd393a16360cedebfb891125
-
SSDEEP
24576:Xtb20pkaCqT5TBWgNQ7aaGNhHYefDINn9Zr3qH6A:UVg5tQ7aaaHYaEN9K5
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 3052 2240 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2076 RegSvcs.exe 2076 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2076 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 2076 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 30 PID 2240 wrote to memory of 3052 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 31 PID 2240 wrote to memory of 3052 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 31 PID 2240 wrote to memory of 3052 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 31 PID 2240 wrote to memory of 3052 2240 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"C:\Users\Admin\AppData\Local\Temp\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 2962⤵
- Program crash
PID:3052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5ff1b10a63c5c72bc7e8ef4585a5e6193
SHA1db6f552a91a8a696667760d8beed428460ed3ef6
SHA256d34f4d0df669936bccec5520c9031b03519a2f7d2f7ad37a4de25d6d7986aad1
SHA512b120a13ed50e71bcf241f85d3a3366b82110f2b45b8b47c6db7407c238ba16885e53eefc6db7436567c218453cab44d144cd65bf62a2bd7c6529629e55a99a58