Analysis
-
max time kernel
148s -
max time network
107s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
10-05-2021 06:31
Static task
static1
Behavioral task
behavioral1
Sample
SOA May.xlt
Resource
win7v20210408
Behavioral task
behavioral2
Sample
SOA May.xlt
Resource
win10v20210410
General
-
Target
SOA May.xlt
-
Size
708KB
-
MD5
eab9dd0c6c9970b12851dc56c8e77ebb
-
SHA1
0ce87f1116fe287bc9415a051af23c81d27449c1
-
SHA256
1c409fee36dda5337ef340dd480d92fbf68da68bee2a28f267def6bbb63755f6
-
SHA512
fc619429f3ff49df839345f754ada67b35960c015b0be84289ae9aad8174142f4b6bce067bcb7babefd6aac65399806c528417329eb3dc1c87f0073e08bdb4cb
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.tractorandinas.com/ - Port:
21 - Username:
[email protected] - Password:
~P*xO7vPBc-o
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
.NET Reactor proctector 2 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/1600-85-0x0000000001F30000-0x0000000001F7D000-memory.dmp net_reactor behavioral1/memory/1600-90-0x0000000004720000-0x000000000476C000-memory.dmp net_reactor -
AgentTesla Payload 2 IoCs
resource yara_rule behavioral1/memory/1600-85-0x0000000001F30000-0x0000000001F7D000-memory.dmp family_agenttesla behavioral1/memory/1600-90-0x0000000004720000-0x000000000476C000-memory.dmp family_agenttesla -
Downloads MZ/PE file
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts ctci.exe -
Executes dropped EXE 4 IoCs
pid Process 736 ctci.exe 1600 ctci.exe 1828 Netplwiz.exe 1020 Netplwiz.exe -
Loads dropped DLL 2 IoCs
pid Process 1028 EXCEL.EXE 1028 EXCEL.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vaijia = "C:\\Users\\Public\\aijiaV.url" ctci.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 736 set thread context of 1600 736 ctci.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1028 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 ctci.exe 1600 ctci.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 ctci.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1028 EXCEL.EXE 1028 EXCEL.EXE 1028 EXCEL.EXE 1028 EXCEL.EXE 1028 EXCEL.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1028 wrote to memory of 736 1028 EXCEL.EXE 31 PID 1028 wrote to memory of 736 1028 EXCEL.EXE 31 PID 1028 wrote to memory of 736 1028 EXCEL.EXE 31 PID 1028 wrote to memory of 736 1028 EXCEL.EXE 31 PID 736 wrote to memory of 1600 736 ctci.exe 34 PID 736 wrote to memory of 1600 736 ctci.exe 34 PID 736 wrote to memory of 1600 736 ctci.exe 34 PID 736 wrote to memory of 1600 736 ctci.exe 34 PID 736 wrote to memory of 1600 736 ctci.exe 34 PID 736 wrote to memory of 1600 736 ctci.exe 34 PID 736 wrote to memory of 304 736 ctci.exe 35 PID 736 wrote to memory of 304 736 ctci.exe 35 PID 736 wrote to memory of 304 736 ctci.exe 35 PID 736 wrote to memory of 304 736 ctci.exe 35 PID 304 wrote to memory of 1408 304 cmd.exe 37 PID 304 wrote to memory of 1408 304 cmd.exe 37 PID 304 wrote to memory of 1408 304 cmd.exe 37 PID 304 wrote to memory of 1408 304 cmd.exe 37
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\SOA May.xlt"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\ctci.exe"C:\Users\Admin\ctci.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\ctci.exeC:\Users\Admin\ctci.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\stt.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /K C:\Users\Public\PXOR.bat4⤵PID:1408
-
C:\Windows \System32\Netplwiz.exe"C:\Windows \System32\Netplwiz.exe"5⤵
- Executes dropped EXE
PID:1828
-
-
C:\Windows \System32\Netplwiz.exe"C:\Windows \System32\Netplwiz.exe"5⤵
- Executes dropped EXE
PID:1020
-
-
-
-