Analysis

  • max time kernel
    105s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    04/10/2022, 19:17

General

  • Target

    DHL SHIPPING INVOICE DOCUMENTS.xlsx

  • Size

    1.9MB

  • MD5

    69b5e23e5c3f2f1127d914b78411ad78

  • SHA1

    0b55196d6305ba77d4af93ee28c9a8aa82a80798

  • SHA256

    995859ba8baecde236921c675cd9ee469acf1d6f8027b4a30babe67a2335c809

  • SHA512

    6d1fd1461ee36cb6e1af9ffab5e0df3271a54b707b7fe1b44c7c7c48d98882ed52ebde322ef0e45d13f689f9cf8a3e581f5615f765298867fbf4c46f9afceb84

  • SSDEEP

    49152:kjEXlD82bJ74Lq45V23Q9IB7ZX48JzoxmOKZi0x4PlXwCc:kWlD82b85V/01X48J4Fqi0uTc

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.allerbestpf.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Pascal59#Miller

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\DHL SHIPPING INVOICE DOCUMENTS.xlsx"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:848
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1672
    • C:\Users\Admin\AppData\Roaming\word.exe
      C:\Users\Admin\AppData\Roaming\word.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:452
      • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe
        "C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1432
        • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe
          "C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"
          4⤵
          • Executes dropped EXE
          PID:1620
        • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe
          "C:\Users\Admin\AppData\Local\Temp\ifvhe.exe"
          4⤵
          • Loads dropped DLL
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:1312

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • C:\Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • C:\Users\Admin\AppData\Local\Temp\nrlptueg.mco

    Filesize

    287KB

    MD5

    665c1fe04f066e660fb00cbd7a957c32

    SHA1

    028620af19d44e979830f756cffba6aed0aa244f

    SHA256

    cb5fc9ae21af75a8475a9b3d456400bffd34f3a73059f5f5b58353dc37d34b31

    SHA512

    c85cc3c9aa6eeeb1811284f76f71c9eef4a3e42607e6e8145b936ed5e11ac889d1c5b7b01b4c1d02def36b4faa289a19bfd1327c21424a34fb9ffcb903de55fa

  • C:\Users\Admin\AppData\Local\Temp\orhxnkyumlz.tu

    Filesize

    4KB

    MD5

    695c250e0629ab61d8729ef8e8af5f75

    SHA1

    371fec3ac5664fd292ba8a7bdd05383c85a956a8

    SHA256

    09629e54fb0f2811254d37d4faed78e22cc933c4dfca0421e53e755733299513

    SHA512

    71ef965c967eaf31cbbc6a26b17623ccebe9ea347c0b0f658d4aa0f244d0068bad2972f372ffaee69592c4d4e9c56be24543f32d26fe1092af29551bd4d9a640

  • C:\Users\Admin\AppData\Roaming\word.exe

    Filesize

    798KB

    MD5

    760971f4f588d25fcb74938cc7b778d9

    SHA1

    df46c6d1de7aec7a462faf0a7019b69acf195256

    SHA256

    7813dfab45495b61483bf8b3ed97661dfadad39e080745a5c5fc841841a5602d

    SHA512

    05fbffe110598679ca2ef1f3789b896685e5258cf54fcd2be148cdf8ad0778ff0494f7f06293c5cd109153c8a840a5e1ac984bbbabb1400245578a6f8bd54dab

  • C:\Users\Admin\AppData\Roaming\word.exe

    Filesize

    798KB

    MD5

    760971f4f588d25fcb74938cc7b778d9

    SHA1

    df46c6d1de7aec7a462faf0a7019b69acf195256

    SHA256

    7813dfab45495b61483bf8b3ed97661dfadad39e080745a5c5fc841841a5602d

    SHA512

    05fbffe110598679ca2ef1f3789b896685e5258cf54fcd2be148cdf8ad0778ff0494f7f06293c5cd109153c8a840a5e1ac984bbbabb1400245578a6f8bd54dab

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Local\Temp\ifvhe.exe

    Filesize

    5KB

    MD5

    023d6474d022a8538259096ee676b365

    SHA1

    4a93521e05877f142da3f1a743a7715b486edd77

    SHA256

    856c4c4a932bc7f4b8ecb92bcfc96e7bb430db4dfeadd9ba92a5283f3aecef2e

    SHA512

    0df18e62af3c1958ed96a1858c090da1d151e997d2e95940392ed154c217fb5f45847c620771fd1eaa6ce0b8ce2ae2d3bb6fc932ef51d263bfa47adceca95a02

  • \Users\Admin\AppData\Roaming\word.exe

    Filesize

    798KB

    MD5

    760971f4f588d25fcb74938cc7b778d9

    SHA1

    df46c6d1de7aec7a462faf0a7019b69acf195256

    SHA256

    7813dfab45495b61483bf8b3ed97661dfadad39e080745a5c5fc841841a5602d

    SHA512

    05fbffe110598679ca2ef1f3789b896685e5258cf54fcd2be148cdf8ad0778ff0494f7f06293c5cd109153c8a840a5e1ac984bbbabb1400245578a6f8bd54dab

  • memory/848-57-0x00000000721BD000-0x00000000721C8000-memory.dmp

    Filesize

    44KB

  • memory/848-82-0x00000000721BD000-0x00000000721C8000-memory.dmp

    Filesize

    44KB

  • memory/848-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/848-58-0x0000000075601000-0x0000000075603000-memory.dmp

    Filesize

    8KB

  • memory/848-54-0x000000002F941000-0x000000002F944000-memory.dmp

    Filesize

    12KB

  • memory/848-84-0x00000000721BD000-0x00000000721C8000-memory.dmp

    Filesize

    44KB

  • memory/848-55-0x00000000711D1000-0x00000000711D3000-memory.dmp

    Filesize

    8KB

  • memory/848-83-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1312-81-0x00000000002C0000-0x00000000002FA000-memory.dmp

    Filesize

    232KB