Analysis

  • max time kernel
    137s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    18-10-2021 11:22

General

  • Target

    presupuesto.xlsx

  • Size

    343KB

  • MD5

    06ca1a5736b494936c1be9d3855a7c3d

  • SHA1

    6337e0b8e7203e1fa3afd6fa0bc95028686797b4

  • SHA256

    d240fe59e56ffa5d4a0f46043b6661f4842fccfc284e6b4d12ff59de67b3a162

  • SHA512

    a5113cd1aba3dab0ade550a45a32439095958d62cacc82ca457b0c4b4f84cb789f2c2e8564214239f49b6cd3cc62d4f757882c73d2710ce7aaa8a9cc3bc91237

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot1923270472:AAFHljVp-f8Q5-X0iy70Vfe0aTch5THPa-U/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 5 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\presupuesto.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1604
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:776
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1064
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SzbGjGvdD" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBEEC.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:428
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:920
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:1084
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
              PID:976
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1704

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\vbc.exe

          MD5

          52cd71bde1c747ac5eef94c0a71ffe70

          SHA1

          6d10a726bf14496b320851421a60cd4da5837adc

          SHA256

          916b446b19717fe163480a61d7de015fa27b4a06e352bb0b15b38ff87ce62665

          SHA512

          4ec9d9b4b5b4ae08663a936e76f10a45cd29a2d28126088f8b232548279350080dca06e08de1f1f2996496797f31c43ccb69f0214f0e81f69db1534bdc652e0e

        • C:\Users\Public\vbc.exe

          MD5

          52cd71bde1c747ac5eef94c0a71ffe70

          SHA1

          6d10a726bf14496b320851421a60cd4da5837adc

          SHA256

          916b446b19717fe163480a61d7de015fa27b4a06e352bb0b15b38ff87ce62665

          SHA512

          4ec9d9b4b5b4ae08663a936e76f10a45cd29a2d28126088f8b232548279350080dca06e08de1f1f2996496797f31c43ccb69f0214f0e81f69db1534bdc652e0e

        • \Users\Public\vbc.exe

          MD5

          52cd71bde1c747ac5eef94c0a71ffe70

          SHA1

          6d10a726bf14496b320851421a60cd4da5837adc

          SHA256

          916b446b19717fe163480a61d7de015fa27b4a06e352bb0b15b38ff87ce62665

          SHA512

          4ec9d9b4b5b4ae08663a936e76f10a45cd29a2d28126088f8b232548279350080dca06e08de1f1f2996496797f31c43ccb69f0214f0e81f69db1534bdc652e0e

        • memory/428-69-0x0000000000000000-mapping.dmp

        • memory/776-58-0x0000000075F41000-0x0000000075F43000-memory.dmp

          Filesize

          8KB

        • memory/1064-66-0x00000000002D0000-0x00000000002DE000-memory.dmp

          Filesize

          56KB

        • memory/1064-60-0x0000000000000000-mapping.dmp

        • memory/1064-63-0x0000000000E40000-0x0000000000E41000-memory.dmp

          Filesize

          4KB

        • memory/1064-65-0x0000000004670000-0x0000000004671000-memory.dmp

          Filesize

          4KB

        • memory/1064-68-0x00000000046B0000-0x0000000004708000-memory.dmp

          Filesize

          352KB

        • memory/1604-57-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1604-55-0x000000002F6C1000-0x000000002F6C4000-memory.dmp

          Filesize

          12KB

        • memory/1604-67-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1604-56-0x00000000717D1000-0x00000000717D3000-memory.dmp

          Filesize

          8KB

        • memory/1704-70-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1704-71-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1704-72-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1704-73-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1704-75-0x000000000043774E-mapping.dmp

        • memory/1704-74-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1704-76-0x0000000000400000-0x000000000043C000-memory.dmp

          Filesize

          240KB

        • memory/1704-78-0x00000000049F0000-0x00000000049F1000-memory.dmp

          Filesize

          4KB