Analysis
-
max time kernel
123s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 15:07
Static task
static1
Behavioral task
behavioral1
Sample
RFQ Ranger Neo.doc
Resource
win7v20210408
Behavioral task
behavioral2
Sample
RFQ Ranger Neo.doc
Resource
win10v20210408
General
-
Target
RFQ Ranger Neo.doc
-
Size
4KB
-
MD5
d51db0f037f97835cb334b38b4ce772f
-
SHA1
ebdd88a747493385c96da530271e214df874f0ab
-
SHA256
9eb87a2416b79b100ca24fa57d1bfa15fcce90a44f5cbb10353ed7e873394753
-
SHA512
094f8019710b1a176bd5bc55ad34ce36f7e01944d1376ffd8bde1b807bbd4e6cfc02c2903027acf0b6912a0a9d6f39ce3397d37e4106584a6187e90a9483f966
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.privateemail.com - Port:
587 - Username:
[email protected] - Password:
Neways@123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1988-80-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1988-81-0x000000000043747E-mapping.dmp family_agenttesla behavioral1/memory/1988-83-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Blocklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 6 1128 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
poiuytrewasdfghjbvdghty.exepoiuytrewasdfghjbvdghty.exepid process 568 poiuytrewasdfghjbvdghty.exe 1988 poiuytrewasdfghjbvdghty.exe -
Loads dropped DLL 1 IoCs
Processes:
EQNEDT32.EXEpid process 1128 EQNEDT32.EXE -
Suspicious use of SetThreadContext 1 IoCs
Processes:
poiuytrewasdfghjbvdghty.exedescription pid process target process PID 568 set thread context of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Office loads VBA resources, possible macro or embedded object present
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 360 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
poiuytrewasdfghjbvdghty.exepid process 1988 poiuytrewasdfghjbvdghty.exe 1988 poiuytrewasdfghjbvdghty.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
poiuytrewasdfghjbvdghty.exedescription pid process Token: SeDebugPrivilege 1988 poiuytrewasdfghjbvdghty.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 360 WINWORD.EXE 360 WINWORD.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
EQNEDT32.EXEWINWORD.EXEpoiuytrewasdfghjbvdghty.exedescription pid process target process PID 1128 wrote to memory of 568 1128 EQNEDT32.EXE poiuytrewasdfghjbvdghty.exe PID 1128 wrote to memory of 568 1128 EQNEDT32.EXE poiuytrewasdfghjbvdghty.exe PID 1128 wrote to memory of 568 1128 EQNEDT32.EXE poiuytrewasdfghjbvdghty.exe PID 1128 wrote to memory of 568 1128 EQNEDT32.EXE poiuytrewasdfghjbvdghty.exe PID 360 wrote to memory of 824 360 WINWORD.EXE splwow64.exe PID 360 wrote to memory of 824 360 WINWORD.EXE splwow64.exe PID 360 wrote to memory of 824 360 WINWORD.EXE splwow64.exe PID 360 wrote to memory of 824 360 WINWORD.EXE splwow64.exe PID 568 wrote to memory of 1632 568 poiuytrewasdfghjbvdghty.exe schtasks.exe PID 568 wrote to memory of 1632 568 poiuytrewasdfghjbvdghty.exe schtasks.exe PID 568 wrote to memory of 1632 568 poiuytrewasdfghjbvdghty.exe schtasks.exe PID 568 wrote to memory of 1632 568 poiuytrewasdfghjbvdghty.exe schtasks.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe PID 568 wrote to memory of 1988 568 poiuytrewasdfghjbvdghty.exe poiuytrewasdfghjbvdghty.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\RFQ Ranger Neo.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:824
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Roaming\poiuytrewasdfghjbvdghty.exe"C:\Users\Admin\AppData\Roaming\poiuytrewasdfghjbvdghty.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OpGRFzGqGKqPJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFD04.tmp"3⤵
- Creates scheduled task(s)
PID:1632
-
-
C:\Users\Admin\AppData\Roaming\poiuytrewasdfghjbvdghty.exe"C:\Users\Admin\AppData\Roaming\poiuytrewasdfghjbvdghty.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b442375721093d59fe49762018ff9ca2
SHA17242a1de6aae1819045ee201def18c73e57e13d0
SHA2563bf39a5c99ce74234bf70afa7d09774a2b9ee489e7574f06548dbe7aa8dd8992
SHA51294f61d0ebf51799b818a8d0219c758e2f1ca7fccbe79dc28462578eb13ba6a75ddba22692312236bbeaf18790f769ebf2061a1f86998dbf08846a3ed178be02e
-
MD5
ba9c98a7b7ae0c218b4b29579b6cef0d
SHA1eb485b41a99ca4b38183f130b9a180bcab2f3477
SHA256b9cc4e51b1539a1e0222c25d78b79329cbcfc16c92f552f1a9627eef8738f439
SHA51263aea87f171082a2763a1edbba8a33513b563295fa8f7e8ee75863fc8c12161d13118d6af99f5dd55b36ffab3321ab0d04270bcafad0e39e307f21f3f86ad8f2
-
MD5
ba9c98a7b7ae0c218b4b29579b6cef0d
SHA1eb485b41a99ca4b38183f130b9a180bcab2f3477
SHA256b9cc4e51b1539a1e0222c25d78b79329cbcfc16c92f552f1a9627eef8738f439
SHA51263aea87f171082a2763a1edbba8a33513b563295fa8f7e8ee75863fc8c12161d13118d6af99f5dd55b36ffab3321ab0d04270bcafad0e39e307f21f3f86ad8f2
-
MD5
ba9c98a7b7ae0c218b4b29579b6cef0d
SHA1eb485b41a99ca4b38183f130b9a180bcab2f3477
SHA256b9cc4e51b1539a1e0222c25d78b79329cbcfc16c92f552f1a9627eef8738f439
SHA51263aea87f171082a2763a1edbba8a33513b563295fa8f7e8ee75863fc8c12161d13118d6af99f5dd55b36ffab3321ab0d04270bcafad0e39e307f21f3f86ad8f2
-
MD5
ba9c98a7b7ae0c218b4b29579b6cef0d
SHA1eb485b41a99ca4b38183f130b9a180bcab2f3477
SHA256b9cc4e51b1539a1e0222c25d78b79329cbcfc16c92f552f1a9627eef8738f439
SHA51263aea87f171082a2763a1edbba8a33513b563295fa8f7e8ee75863fc8c12161d13118d6af99f5dd55b36ffab3321ab0d04270bcafad0e39e307f21f3f86ad8f2