Analysis

  • max time kernel
    102s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2023 06:57

General

  • Target

    ac83d6b235460fb3516e0efb7b91d2159ab4636e.rtf

  • Size

    26KB

  • MD5

    051873c5ce8770dd82270d6ac13e3061

  • SHA1

    ac83d6b235460fb3516e0efb7b91d2159ab4636e

  • SHA256

    5f8573d933fb9af96a8e7fb3ad4083e7d5fdad2c4a5960b7dc7f79bb788b6658

  • SHA512

    b424ea79c54f3743692d7831154cbb123f204a6ab41a889c6d7f39f17d8ee6122b3e2782b253266b2186383afae2afd96bc05d1f0ba33b6b5db432444bfa0f4d

  • SSDEEP

    768:4Fx0XaIsnPRIa4fwJMRoSaDlnc1pzULHCdn+az:4f0Xvx3EMRodlgp5Iaz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hnxqezadblabdsss

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ac83d6b235460fb3516e0efb7b91d2159ab4636e.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1184
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Users\Admin\AppData\Roaming\obiyu6581.exe
        "C:\Users\Admin\AppData\Roaming\obiyu6581.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe
          "C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe" C:\Users\Admin\AppData\Local\Temp\dhvsiqlnof.chn
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1436
          • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe
            "C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:1180

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\btjlomezd.de

      Filesize

      294KB

      MD5

      9a3100fbf00249776c39703d74c86bcb

      SHA1

      9308566b4f0cf8785801514b6c09c27ad545b5bb

      SHA256

      3d63c09cc48a8e04833c25ca7505d092e96c9239c486d00f1f19a32e776f55d2

      SHA512

      daccf35446fc9efed13227a40c0264f3968eb0efb8dd8f98eef4efc32b66f38aa3519ac3bb85d407ecde1d241c7dddbd2f455535ae53803c2c0a84992068fe1d

    • C:\Users\Admin\AppData\Local\Temp\dhvsiqlnof.chn

      Filesize

      5KB

      MD5

      093ea54ba6d9c524c8e4f208c1140716

      SHA1

      4a4e416313436fb0030bfd693b5880b1e883a05f

      SHA256

      df7f5bed79354218b633634b66b21ed1c0a8321835b446374f3f5192d0a84f3e

      SHA512

      cb44bcc354de2bcd7e5c193ee374d8db07de41c39a8b8d2620156b40c7266e754cc48a9c24119f909312760d550fac1374adca52a7855e12502049e861e8cb9a

    • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • C:\Users\Admin\AppData\Roaming\obiyu6581.exe

      Filesize

      463KB

      MD5

      7d8b4ff9fc0226efd409c8162928efaa

      SHA1

      7877ccd3084da333c77b353a6dc65b8e00b0a393

      SHA256

      04698304959253365ac8015e9af904b4be0e1938c63a5b91276028636a90cbbc

      SHA512

      9b1c5642f9044719a7456826dea490b329775258e84e47ac48f7563792fe466062b0a0566bda57e8755ba23982e154c2f967e5ed61dee84469f5ac3246b08fe1

    • C:\Users\Admin\AppData\Roaming\obiyu6581.exe

      Filesize

      463KB

      MD5

      7d8b4ff9fc0226efd409c8162928efaa

      SHA1

      7877ccd3084da333c77b353a6dc65b8e00b0a393

      SHA256

      04698304959253365ac8015e9af904b4be0e1938c63a5b91276028636a90cbbc

      SHA512

      9b1c5642f9044719a7456826dea490b329775258e84e47ac48f7563792fe466062b0a0566bda57e8755ba23982e154c2f967e5ed61dee84469f5ac3246b08fe1

    • \Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • \Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • \Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • \Users\Admin\AppData\Roaming\obiyu6581.exe

      Filesize

      463KB

      MD5

      7d8b4ff9fc0226efd409c8162928efaa

      SHA1

      7877ccd3084da333c77b353a6dc65b8e00b0a393

      SHA256

      04698304959253365ac8015e9af904b4be0e1938c63a5b91276028636a90cbbc

      SHA512

      9b1c5642f9044719a7456826dea490b329775258e84e47ac48f7563792fe466062b0a0566bda57e8755ba23982e154c2f967e5ed61dee84469f5ac3246b08fe1

    • memory/1180-78-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB

    • memory/1180-77-0x0000000001D70000-0x0000000001DA8000-memory.dmp

      Filesize

      224KB

    • memory/1184-81-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmp

      Filesize

      8KB

    • memory/2004-54-0x0000000072021000-0x0000000072024000-memory.dmp

      Filesize

      12KB

    • memory/2004-58-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/2004-55-0x000000006FAA1000-0x000000006FAA3000-memory.dmp

      Filesize

      8KB

    • memory/2004-79-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB

    • memory/2004-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2004-57-0x0000000074AB1000-0x0000000074AB3000-memory.dmp

      Filesize

      8KB

    • memory/2004-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2004-83-0x0000000070A8D000-0x0000000070A98000-memory.dmp

      Filesize

      44KB