Analysis

  • max time kernel
    100s
  • max time network
    44s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2023 12:41

General

  • Target

    77d3eb1a7c578f265ed939a163907172b0f2ff2f.rtf

  • Size

    32KB

  • MD5

    1c8dff1ba5adb253c975739d5d9efe57

  • SHA1

    77d3eb1a7c578f265ed939a163907172b0f2ff2f

  • SHA256

    faf71181b4aee21a871a05e74566356faca82201252d20cb3ef1cd75dcef2b16

  • SHA512

    fb288e2829bb9a55fcca55029565000f3f9a69ad70a78285792a2b318f84fd56270221a96af9140427864e8c0cf5c2154de24d49ac5b2563ebcfb40573e07b64

  • SSDEEP

    768:eWPFx0XaIsnPRIa4fwJMw9GeKjD6PNCL8yGSobsWcXcF:FPf0Xvx3EMwM6Kt6CcF

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.valvulasthermovalve.cl/
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    LILKOOLL14!!

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\77d3eb1a7c578f265ed939a163907172b0f2ff2f.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:940
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1452
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Users\Admin\AppData\Roaming\damianoyrer58.exe
        "C:\Users\Admin\AppData\Roaming\damianoyrer58.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Users\Admin\AppData\Local\Temp\zlsuy.exe
          "C:\Users\Admin\AppData\Local\Temp\zlsuy.exe" C:\Users\Admin\AppData\Local\Temp\rtliuo.x
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1488
          • C:\Users\Admin\AppData\Local\Temp\zlsuy.exe
            "C:\Users\Admin\AppData\Local\Temp\zlsuy.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:824

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\rtliuo.x

      Filesize

      5KB

      MD5

      8d624e5504a97250b8c1fa3d83db0e05

      SHA1

      fcd8b4ed0aadb8bba9a9962995c668df218c27ed

      SHA256

      9e7bfd63c3bb515d1e3abd9ec89a70138f44fa94c53b2bc203586ed9d97187f6

      SHA512

      3e0679d03681f7caa77ebdbfa078a9713187be38d182abc12fa2d4e4de59821151ffe5b9d8961ee7445e50ad92a773105398ae9df29941d6dc1be66082363d1d

    • C:\Users\Admin\AppData\Local\Temp\xbritzpb.jl

      Filesize

      307KB

      MD5

      4a9d44158a7bfcd0fd1ec875ded60617

      SHA1

      b26e473baa2f5ca098dff6389482a90cb6856a8c

      SHA256

      1367c8b1b7bad04734a69fb76c8a42c39dbbdc102ac099a9584a8c56269c2b7f

      SHA512

      d281ea8025578040247ff783c9636dbc1f4c133b2fdbfbcc5edae9015189487637e596bf681761e870f6bb9e7efff778e1bb490d3c382406975e85aeeb15fdb6

    • C:\Users\Admin\AppData\Local\Temp\zlsuy.exe

      Filesize

      62KB

      MD5

      137d415fd4c0b0de1627cf9abf985ae5

      SHA1

      bf0c76fa80b800d94db48a1180d146cc2d26647f

      SHA256

      ae26439b268a3368f97b0086a66b87f171ab1195ab16bc5d7067366de3916c59

      SHA512

      e82a09b747d96a4fa88fad423093838408da82e4e51b3daa09a07cc8a387df16fcc87a34c7d860f66914c8134351c055e9f844ea4f52d01b11b88bed04eb8d4f

    • C:\Users\Admin\AppData\Local\Temp\zlsuy.exe

      Filesize

      62KB

      MD5

      137d415fd4c0b0de1627cf9abf985ae5

      SHA1

      bf0c76fa80b800d94db48a1180d146cc2d26647f

      SHA256

      ae26439b268a3368f97b0086a66b87f171ab1195ab16bc5d7067366de3916c59

      SHA512

      e82a09b747d96a4fa88fad423093838408da82e4e51b3daa09a07cc8a387df16fcc87a34c7d860f66914c8134351c055e9f844ea4f52d01b11b88bed04eb8d4f

    • C:\Users\Admin\AppData\Local\Temp\zlsuy.exe

      Filesize

      62KB

      MD5

      137d415fd4c0b0de1627cf9abf985ae5

      SHA1

      bf0c76fa80b800d94db48a1180d146cc2d26647f

      SHA256

      ae26439b268a3368f97b0086a66b87f171ab1195ab16bc5d7067366de3916c59

      SHA512

      e82a09b747d96a4fa88fad423093838408da82e4e51b3daa09a07cc8a387df16fcc87a34c7d860f66914c8134351c055e9f844ea4f52d01b11b88bed04eb8d4f

    • C:\Users\Admin\AppData\Roaming\damianoyrer58.exe

      Filesize

      525KB

      MD5

      e2733a5dd19a546275fca8f958569312

      SHA1

      517fa0d68f0604508b3c65d36ab15114ccf9acc1

      SHA256

      5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594

      SHA512

      80ff304269a4df1118c889871240c1a4c9f2e5d7966644690ef1056d00662f040ea4352bcde3cdece65cf4e4a55e229c321567c705c96fd5ddaf2cfb70ceaafb

    • C:\Users\Admin\AppData\Roaming\damianoyrer58.exe

      Filesize

      525KB

      MD5

      e2733a5dd19a546275fca8f958569312

      SHA1

      517fa0d68f0604508b3c65d36ab15114ccf9acc1

      SHA256

      5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594

      SHA512

      80ff304269a4df1118c889871240c1a4c9f2e5d7966644690ef1056d00662f040ea4352bcde3cdece65cf4e4a55e229c321567c705c96fd5ddaf2cfb70ceaafb

    • \Users\Admin\AppData\Local\Temp\zlsuy.exe

      Filesize

      62KB

      MD5

      137d415fd4c0b0de1627cf9abf985ae5

      SHA1

      bf0c76fa80b800d94db48a1180d146cc2d26647f

      SHA256

      ae26439b268a3368f97b0086a66b87f171ab1195ab16bc5d7067366de3916c59

      SHA512

      e82a09b747d96a4fa88fad423093838408da82e4e51b3daa09a07cc8a387df16fcc87a34c7d860f66914c8134351c055e9f844ea4f52d01b11b88bed04eb8d4f

    • \Users\Admin\AppData\Local\Temp\zlsuy.exe

      Filesize

      62KB

      MD5

      137d415fd4c0b0de1627cf9abf985ae5

      SHA1

      bf0c76fa80b800d94db48a1180d146cc2d26647f

      SHA256

      ae26439b268a3368f97b0086a66b87f171ab1195ab16bc5d7067366de3916c59

      SHA512

      e82a09b747d96a4fa88fad423093838408da82e4e51b3daa09a07cc8a387df16fcc87a34c7d860f66914c8134351c055e9f844ea4f52d01b11b88bed04eb8d4f

    • \Users\Admin\AppData\Local\Temp\zlsuy.exe

      Filesize

      62KB

      MD5

      137d415fd4c0b0de1627cf9abf985ae5

      SHA1

      bf0c76fa80b800d94db48a1180d146cc2d26647f

      SHA256

      ae26439b268a3368f97b0086a66b87f171ab1195ab16bc5d7067366de3916c59

      SHA512

      e82a09b747d96a4fa88fad423093838408da82e4e51b3daa09a07cc8a387df16fcc87a34c7d860f66914c8134351c055e9f844ea4f52d01b11b88bed04eb8d4f

    • \Users\Admin\AppData\Roaming\damianoyrer58.exe

      Filesize

      525KB

      MD5

      e2733a5dd19a546275fca8f958569312

      SHA1

      517fa0d68f0604508b3c65d36ab15114ccf9acc1

      SHA256

      5ace7702d0fa480105ae05c8edd6344513b3f911d4257a6dec9c123d66a8e594

      SHA512

      80ff304269a4df1118c889871240c1a4c9f2e5d7966644690ef1056d00662f040ea4352bcde3cdece65cf4e4a55e229c321567c705c96fd5ddaf2cfb70ceaafb

    • memory/552-61-0x0000000000000000-mapping.dmp

    • memory/824-74-0x0000000000401896-mapping.dmp

    • memory/824-78-0x0000000000400000-0x000000000044C000-memory.dmp

      Filesize

      304KB

    • memory/824-77-0x00000000003A0000-0x00000000003DA000-memory.dmp

      Filesize

      232KB

    • memory/940-57-0x0000000071A3D000-0x0000000071A48000-memory.dmp

      Filesize

      44KB

    • memory/940-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/940-55-0x0000000070A51000-0x0000000070A53000-memory.dmp

      Filesize

      8KB

    • memory/940-58-0x0000000076411000-0x0000000076413000-memory.dmp

      Filesize

      8KB

    • memory/940-54-0x0000000072FD1000-0x0000000072FD4000-memory.dmp

      Filesize

      12KB

    • memory/940-79-0x0000000071A3D000-0x0000000071A48000-memory.dmp

      Filesize

      44KB

    • memory/940-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/940-83-0x0000000071A3D000-0x0000000071A48000-memory.dmp

      Filesize

      44KB

    • memory/1452-80-0x0000000000000000-mapping.dmp

    • memory/1452-81-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp

      Filesize

      8KB

    • memory/1488-67-0x0000000000000000-mapping.dmp