Overview
overview
10Static
static
10PRE-ADVISE...49.exe
windows7-x64
10PRE-ADVISE...49.exe
windows10-2004-x64
10New P.O.exe
windows7-x64
10New P.O.exe
windows10-2004-x64
10174d337dc9...e8.exe
windows7-x64
10174d337dc9...e8.exe
windows10-2004-x64
31acc6fd285...05.elf
debian-12-armhf
9JDtnp2mcrQvXDeo.exe
windows7-x64
10JDtnp2mcrQvXDeo.exe
windows10-2004-x64
1073c5c4b126...f0.exe
windows7-x64
1073c5c4b126...f0.exe
windows10-2004-x64
10PR-ZWL 07...O).exe
windows7-x64
8PR-ZWL 07...O).exe
windows10-2004-x64
8SOA pdf.exe
windows7-x64
10SOA pdf.exe
windows10-2004-x64
108c56b0f77a...4a.exe
windows7-x64
108c56b0f77a...4a.exe
windows10-2004-x64
10a7756cd5c5...c1.elf
debian-12-armhf
1ac6ea6239a...de.exe
windows7-x64
7ac6ea6239a...de.exe
windows10-2004-x64
7c55761decb...27.elf
ubuntu-22.04-amd64
c79a98c3a1...73.exe
windows7-x64
8c79a98c3a1...73.exe
windows10-2004-x64
8d30f8c9b89...30.doc
windows7-x64
4d30f8c9b89...30.doc
windows10-2004-x64
1d38f510bc1...26.exe
windows7-x64
1d38f510bc1...26.exe
windows10-2004-x64
1d623c0b8d9...cf.bat
windows7-x64
1d623c0b8d9...cf.bat
windows10-2004-x64
1RFQ-2402-3572.exe
windows7-x64
10RFQ-2402-3572.exe
windows10-2004-x64
10INV&PL.exe
windows7-x64
8Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 02:17
Behavioral task
behavioral1
Sample
PRE-ADVISE PO 45202549.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
PRE-ADVISE PO 45202549.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
New P.O.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
New P.O.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
174d337dc96f1d28833631db40dfb53ed28878b50ade6698a423b222b3ff78e8.exe
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
174d337dc96f1d28833631db40dfb53ed28878b50ade6698a423b222b3ff78e8.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral7
Sample
1acc6fd2850bf39084454669685e98ad49bfab90fcafe1e91f49caf4af182405.elf
Resource
debian12-armhf-20240418-en
Behavioral task
behavioral8
Sample
JDtnp2mcrQvXDeo.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
JDtnp2mcrQvXDeo.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral10
Sample
73c5c4b12646631dbf1e8adf10b52b8635b34d02d753d3fe829bd41210f547f0.exe
Resource
win7-20231129-en
Behavioral task
behavioral11
Sample
73c5c4b12646631dbf1e8adf10b52b8635b34d02d753d3fe829bd41210f547f0.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral12
Sample
PR-ZWL 07364G49574(Revised PO).exe
Resource
win7-20240508-en
Behavioral task
behavioral13
Sample
PR-ZWL 07364G49574(Revised PO).exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral14
Sample
SOA pdf.exe
Resource
win7-20240508-en
Behavioral task
behavioral15
Sample
SOA pdf.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral16
Sample
8c56b0f77abb15a25ffdd9e0700475d339c640c4f40094a8bc97223d850c1f4a.exe
Resource
win7-20240419-en
Behavioral task
behavioral17
Sample
8c56b0f77abb15a25ffdd9e0700475d339c640c4f40094a8bc97223d850c1f4a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral18
Sample
a7756cd5c50f47896fe717bf2ae620f8f3b451e84a70f983c6d79c4f7ad63dc1.elf
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral19
Sample
ac6ea6239a4b82d24b823f1a50ab207652024f33726730d4d7b791fcb2fec7de.exe
Resource
win7-20240611-en
Behavioral task
behavioral20
Sample
ac6ea6239a4b82d24b823f1a50ab207652024f33726730d4d7b791fcb2fec7de.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
c55761decbe72089e99909a2906c693b159c4b31564d8b795f8821b2683dba27.elf
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral22
Sample
c79a98c3a11afabf39a52a12cb7d1ee6cf4f9df5c7bc54aa969296f50b75aa73.exe
Resource
win7-20240221-en
Behavioral task
behavioral23
Sample
c79a98c3a11afabf39a52a12cb7d1ee6cf4f9df5c7bc54aa969296f50b75aa73.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral24
Sample
d30f8c9b89f3bd4630fdfb8b9c5390e7e828846cc99d1ba179a2bee7886e6830.doc
Resource
win7-20240220-en
Behavioral task
behavioral25
Sample
d30f8c9b89f3bd4630fdfb8b9c5390e7e828846cc99d1ba179a2bee7886e6830.doc
Resource
win10v2004-20240508-en
Behavioral task
behavioral26
Sample
d38f510bc1a2f2e389f22e0a8609f531472d1b367111f74de9109b49c91cbe26.exe
Resource
win7-20240508-en
Behavioral task
behavioral27
Sample
d38f510bc1a2f2e389f22e0a8609f531472d1b367111f74de9109b49c91cbe26.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral28
Sample
d623c0b8d9d662362b6347c6862217221e660082ef0a9bff77a83a6efffda4cf.bat
Resource
win7-20240508-en
Behavioral task
behavioral29
Sample
d623c0b8d9d662362b6347c6862217221e660082ef0a9bff77a83a6efffda4cf.bat
Resource
win10v2004-20240611-en
Behavioral task
behavioral30
Sample
RFQ-2402-3572.exe
Resource
win7-20240419-en
Behavioral task
behavioral31
Sample
RFQ-2402-3572.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral32
Sample
INV&PL.exe
Resource
win7-20231129-en
General
-
Target
SOA pdf.exe
-
Size
717KB
-
MD5
0e928f8ca2a45826211c1e02c9ae09f8
-
SHA1
502ba9469f174b8ae062278be8ca847616d4e0f8
-
SHA256
3c4a6a16a5d8679e83400b100265e0513f5993e513d5f17c875976b09cd1bf25
-
SHA512
1ae4d75d15026e3277b42918756b1bc7a91960811136af4672ca48c9b943279b4ff22be4382275629693ae9f17b0c3e95ac1ade95c5bf167086015478aca4ca4
-
SSDEEP
12288:I3qyJMM/F1KswrqeiQgLI/VvH8WX1wMVeARbNPnN9jXBOQS6XczZLK4I7ukDkR:I6ON1KAYVvH8inwARbNPNNX3VMBK41kW
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.tajhiz-gostaran.com - Port:
587 - Username:
[email protected] - Password:
Ohv@dRNG{N^grViQHl - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 4728 powershell.exe 4632 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SOA pdf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation SOA pdf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
RegSvcs.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SOA pdf.exedescription pid process target process PID 1000 set thread context of 540 1000 SOA pdf.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
SOA pdf.exepowershell.exepowershell.exeRegSvcs.exepid process 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 4728 powershell.exe 4632 powershell.exe 4632 powershell.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 1000 SOA pdf.exe 540 RegSvcs.exe 540 RegSvcs.exe 4632 powershell.exe 4728 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SOA pdf.exepowershell.exepowershell.exeRegSvcs.exedescription pid process Token: SeDebugPrivilege 1000 SOA pdf.exe Token: SeDebugPrivilege 4728 powershell.exe Token: SeDebugPrivilege 4632 powershell.exe Token: SeDebugPrivilege 540 RegSvcs.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
SOA pdf.exedescription pid process target process PID 1000 wrote to memory of 4728 1000 SOA pdf.exe powershell.exe PID 1000 wrote to memory of 4728 1000 SOA pdf.exe powershell.exe PID 1000 wrote to memory of 4728 1000 SOA pdf.exe powershell.exe PID 1000 wrote to memory of 4632 1000 SOA pdf.exe powershell.exe PID 1000 wrote to memory of 4632 1000 SOA pdf.exe powershell.exe PID 1000 wrote to memory of 4632 1000 SOA pdf.exe powershell.exe PID 1000 wrote to memory of 1448 1000 SOA pdf.exe schtasks.exe PID 1000 wrote to memory of 1448 1000 SOA pdf.exe schtasks.exe PID 1000 wrote to memory of 1448 1000 SOA pdf.exe schtasks.exe PID 1000 wrote to memory of 2824 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 2824 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 2824 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 3580 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 3580 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 3580 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe PID 1000 wrote to memory of 540 1000 SOA pdf.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA pdf.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TbRQjVqQYK.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TbRQjVqQYK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9097.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logFilesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
18KB
MD592c2d7bd6c85fd091a96450740d2f65c
SHA1d510f2accff6d316717e419be1c40aed6978cb54
SHA256ef39f7ee5d46ba725cb773a007f827d005c5cd24fe6fcfed0cf6986d8979e090
SHA5122ae39093412bba21e23c793162f3761673f642858148cce7483a11e05ea196748f918337fdd57907c2012f908a2f8b032a87350962f5d37b90f1d64fbd5eff9c
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_caciwmrl.vrj.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\tmp9097.tmpFilesize
1KB
MD59f356f7fab59c85b03dd85aa6cf29728
SHA1b3c025ac73e272e9e5b256d97a2ada2c5907e054
SHA25606d0cae24578087156e3f9f69c2e2b0187db69dccd2b6c9f07ef63117a0455a3
SHA51242031bd55711811053e29c1928f44e0e684b3751ce0efbb3a83050def071af01a809f2c8ef927538f887fdda158839f62a49b44eb596140eff6bb455c268cd6f
-
memory/540-48-0x0000000000400000-0x0000000000442000-memory.dmpFilesize
264KB
-
memory/540-82-0x00000000068B0000-0x0000000006900000-memory.dmpFilesize
320KB
-
memory/1000-5-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/1000-50-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/1000-8-0x0000000005E40000-0x0000000005E50000-memory.dmpFilesize
64KB
-
memory/1000-9-0x0000000006E70000-0x0000000006EF2000-memory.dmpFilesize
520KB
-
memory/1000-10-0x000000000ABD0000-0x000000000AC6C000-memory.dmpFilesize
624KB
-
memory/1000-0-0x000000007480E000-0x000000007480F000-memory.dmpFilesize
4KB
-
memory/1000-16-0x000000007480E000-0x000000007480F000-memory.dmpFilesize
4KB
-
memory/1000-7-0x0000000005E20000-0x0000000005E2E000-memory.dmpFilesize
56KB
-
memory/1000-6-0x0000000005CF0000-0x0000000005D06000-memory.dmpFilesize
88KB
-
memory/1000-32-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/1000-4-0x00000000059E0000-0x00000000059EA000-memory.dmpFilesize
40KB
-
memory/1000-3-0x0000000005A30000-0x0000000005AC2000-memory.dmpFilesize
584KB
-
memory/1000-2-0x0000000005F40000-0x00000000064E4000-memory.dmpFilesize
5.6MB
-
memory/1000-1-0x0000000000F30000-0x0000000000FE4000-memory.dmpFilesize
720KB
-
memory/4632-85-0x00000000072A0000-0x00000000072BA000-memory.dmpFilesize
104KB
-
memory/4632-84-0x00000000071A0000-0x00000000071B4000-memory.dmpFilesize
80KB
-
memory/4632-39-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4632-21-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4632-83-0x0000000007190000-0x000000000719E000-memory.dmpFilesize
56KB
-
memory/4632-67-0x00000000750B0000-0x00000000750FC000-memory.dmpFilesize
304KB
-
memory/4632-92-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4632-23-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4632-79-0x0000000006FD0000-0x0000000006FDA000-memory.dmpFilesize
40KB
-
memory/4632-52-0x00000000060C0000-0x000000000610C000-memory.dmpFilesize
304KB
-
memory/4632-51-0x0000000005C40000-0x0000000005C5E000-memory.dmpFilesize
120KB
-
memory/4632-77-0x0000000007600000-0x0000000007C7A000-memory.dmpFilesize
6.5MB
-
memory/4632-78-0x0000000006D50000-0x0000000006D6A000-memory.dmpFilesize
104KB
-
memory/4728-15-0x0000000002D40000-0x0000000002D76000-memory.dmpFilesize
216KB
-
memory/4728-66-0x0000000007600000-0x00000000076A3000-memory.dmpFilesize
652KB
-
memory/4728-55-0x00000000750B0000-0x00000000750FC000-memory.dmpFilesize
304KB
-
memory/4728-65-0x0000000007590000-0x00000000075AE000-memory.dmpFilesize
120KB
-
memory/4728-54-0x00000000075B0000-0x00000000075E2000-memory.dmpFilesize
200KB
-
memory/4728-22-0x0000000005EB0000-0x0000000005ED2000-memory.dmpFilesize
136KB
-
memory/4728-80-0x0000000007BE0000-0x0000000007C76000-memory.dmpFilesize
600KB
-
memory/4728-81-0x0000000007B60000-0x0000000007B71000-memory.dmpFilesize
68KB
-
memory/4728-24-0x0000000005F50000-0x0000000005FB6000-memory.dmpFilesize
408KB
-
memory/4728-25-0x0000000005FC0000-0x0000000006026000-memory.dmpFilesize
408KB
-
memory/4728-38-0x0000000006030000-0x0000000006384000-memory.dmpFilesize
3.3MB
-
memory/4728-20-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4728-86-0x0000000007C80000-0x0000000007C88000-memory.dmpFilesize
32KB
-
memory/4728-19-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4728-18-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB
-
memory/4728-17-0x0000000005880000-0x0000000005EA8000-memory.dmpFilesize
6.2MB
-
memory/4728-93-0x0000000074800000-0x0000000074FB0000-memory.dmpFilesize
7.7MB