Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 19:38
Static task
static1
Behavioral task
behavioral1
Sample
Payment Confirmation.pdf.exe
Resource
win7-20240903-en
General
-
Target
Payment Confirmation.pdf.exe
-
Size
524.5MB
-
MD5
5e6da30aae7e45fb195792cf3163a67c
-
SHA1
6893308eed3c6019293f77bfec989c4801041614
-
SHA256
e743ab98b51a17d68fa30ca3eb1f62f6622a99cb98711cdd3e01fae4e3bd05a5
-
SHA512
9810ce5ad238621fded5d8d27b669c63b14c22490125285b8ffea6d4671595c0c19629e6f51d0f44eee210e5424f738ae899f6f15b700bc9e4d0a49cdea0a0fb
-
SSDEEP
12288:cVMCwy9EXX+IUeU0U/llUrbLlw+P4T/eWkZesmo6XAWadbj8YL84ZBGk:gwFOI9StlAbLz8/NcKqbj98i
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot7000875199:AAGcJDBHFcfVUBvhBO4xZLw34OXk1NWXSe0/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2744 powershell.exe 2580 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 912 2688 Payment Confirmation.pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Confirmation.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Confirmation.pdf.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2624 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2744 powershell.exe 2580 powershell.exe 912 Payment Confirmation.pdf.exe 912 Payment Confirmation.pdf.exe 912 Payment Confirmation.pdf.exe 912 Payment Confirmation.pdf.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2744 powershell.exe Token: SeDebugPrivilege 2580 powershell.exe Token: SeDebugPrivilege 912 Payment Confirmation.pdf.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2744 2688 Payment Confirmation.pdf.exe 30 PID 2688 wrote to memory of 2744 2688 Payment Confirmation.pdf.exe 30 PID 2688 wrote to memory of 2744 2688 Payment Confirmation.pdf.exe 30 PID 2688 wrote to memory of 2744 2688 Payment Confirmation.pdf.exe 30 PID 2688 wrote to memory of 2580 2688 Payment Confirmation.pdf.exe 32 PID 2688 wrote to memory of 2580 2688 Payment Confirmation.pdf.exe 32 PID 2688 wrote to memory of 2580 2688 Payment Confirmation.pdf.exe 32 PID 2688 wrote to memory of 2580 2688 Payment Confirmation.pdf.exe 32 PID 2688 wrote to memory of 2624 2688 Payment Confirmation.pdf.exe 33 PID 2688 wrote to memory of 2624 2688 Payment Confirmation.pdf.exe 33 PID 2688 wrote to memory of 2624 2688 Payment Confirmation.pdf.exe 33 PID 2688 wrote to memory of 2624 2688 Payment Confirmation.pdf.exe 33 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36 PID 2688 wrote to memory of 912 2688 Payment Confirmation.pdf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.pdf.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\hfdtCQdF.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\hfdtCQdF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D82.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\Payment Confirmation.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:912
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e8944269933fdd1a85956cc71bac5444
SHA19b5111498ff47088e512c7c3af0ebcbe838f3269
SHA2560735651078b342cc3427f5b4a356fb6aba69c71750a12eac8c13729c95d70e95
SHA5128f2b9fda9e1c0995526cc2f02c907b2ca1bcdf3ac02bd0f4be66ed8230005ce725a054732ee837c73ccfefdd74f66d768e62a421403acbb59a6e0fe57e068689
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ea9893de8257e28fbd4188c3e629fc91
SHA155cef0338406dc4c1265c4ccb78aa58eae22a415
SHA2560bcb7742d4e47dbefdb5a97e0d8f1c65d81b4637f84d2a5e5e4c5291d6ea3e7e
SHA512e3671e72b3ef5c5dd905265971c1de7025c17ff23d62c8bfa41cf2e02a376018df4ca475d35cf789dcfb857b0ec7b88453f373eed3ada1e449cbd999729fda71