Analysis
-
max time kernel
105s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 01:55
Static task
static1
Behavioral task
behavioral1
Sample
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
Resource
win7-20240903-en
General
-
Target
CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe
-
Size
1.1MB
-
MD5
1ca01a88b80112024883e55a27b1345a
-
SHA1
3fdcd8cd1ff882b9c76dd93f680bb7f60fc97c7d
-
SHA256
a848e5d8d3a080b81556f4f7ec1fe1103610bf7bbb023065bf2e6696abaf6769
-
SHA512
9f978fe421c5217bccf787df0a105f584cd945be1f43e77f1971d688becaa9682a01acf7585b6bcaf4111103835dbcaa2caef59ccd393a16360cedebfb891125
-
SSDEEP
24576:Xtb20pkaCqT5TBWgNQ7aaGNhHYefDINn9Zr3qH6A:UVg5tQ7aaaHYaEN9K5
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 api.ipify.org 15 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4676 set thread context of 4944 4676 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4944 RegSvcs.exe 4944 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4676 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4944 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4944 4676 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 83 PID 4676 wrote to memory of 4944 4676 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 83 PID 4676 wrote to memory of 4944 4676 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 83 PID 4676 wrote to memory of 4944 4676 CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"C:\Users\Admin\AppData\Local\Temp\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
261KB
MD5ff1b10a63c5c72bc7e8ef4585a5e6193
SHA1db6f552a91a8a696667760d8beed428460ed3ef6
SHA256d34f4d0df669936bccec5520c9031b03519a2f7d2f7ad37a4de25d6d7986aad1
SHA512b120a13ed50e71bcf241f85d3a3366b82110f2b45b8b47c6db7407c238ba16885e53eefc6db7436567c218453cab44d144cd65bf62a2bd7c6529629e55a99a58