Analysis

  • max time kernel
    103s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    30-01-2023 08:17

General

  • Target

    rfq_items_order_purchase_quotation_30012023000000000000.docx

  • Size

    10KB

  • MD5

    9136352a3a3208e5b87191b93eebff30

  • SHA1

    ed48bacf8eec9fb8bae959b8c5cd084f0b545a68

  • SHA256

    23311a11d65e655d55d07d9db638fe865e36b1ef5ba022936678d076ca9f134b

  • SHA512

    e1bd869cb02d2c2e6ed7dcc24648deaccac96a830d93681c6399a2cb3a43fec94355aad8d6169d84bcc433ce3380ae3a17e6dbae5388e7de1264b02d03a87d1c

  • SSDEEP

    192:ScIMmtP5hG/b7XN+eOtWO+5+5F7Jar/YEChI3yZ:SPXRE7XtO47wtar/YECOO

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5672966801:AAGkdauVLuRijg4BBwGbZ-5sO2ggBTSZUHE/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\rfq_items_order_purchase_quotation_30012023000000000000.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1464
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:812
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:328
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1204
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1180

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\vbc.exe
      Filesize

      706KB

      MD5

      83c261ea71476210fa5f69e1e306a0ed

      SHA1

      57e3b8222a66615cc211555f8cdc1b95fc4964ce

      SHA256

      c1b9ddd584078ecf7375239eecc419c3ebcf441c71db62b8e559b88613861026

      SHA512

      cf36d08381582e2ce6c80be7f36ec9e5f84cfd5b99db4058a2089add30584cfc0c4ede27071f7e994d2742ed513cd8a1705a88d573c3cae8f82f2b6f31710525

    • C:\Users\Public\vbc.exe
      Filesize

      706KB

      MD5

      83c261ea71476210fa5f69e1e306a0ed

      SHA1

      57e3b8222a66615cc211555f8cdc1b95fc4964ce

      SHA256

      c1b9ddd584078ecf7375239eecc419c3ebcf441c71db62b8e559b88613861026

      SHA512

      cf36d08381582e2ce6c80be7f36ec9e5f84cfd5b99db4058a2089add30584cfc0c4ede27071f7e994d2742ed513cd8a1705a88d573c3cae8f82f2b6f31710525

    • \Users\Public\vbc.exe
      Filesize

      706KB

      MD5

      83c261ea71476210fa5f69e1e306a0ed

      SHA1

      57e3b8222a66615cc211555f8cdc1b95fc4964ce

      SHA256

      c1b9ddd584078ecf7375239eecc419c3ebcf441c71db62b8e559b88613861026

      SHA512

      cf36d08381582e2ce6c80be7f36ec9e5f84cfd5b99db4058a2089add30584cfc0c4ede27071f7e994d2742ed513cd8a1705a88d573c3cae8f82f2b6f31710525

    • \Users\Public\vbc.exe
      Filesize

      706KB

      MD5

      83c261ea71476210fa5f69e1e306a0ed

      SHA1

      57e3b8222a66615cc211555f8cdc1b95fc4964ce

      SHA256

      c1b9ddd584078ecf7375239eecc419c3ebcf441c71db62b8e559b88613861026

      SHA512

      cf36d08381582e2ce6c80be7f36ec9e5f84cfd5b99db4058a2089add30584cfc0c4ede27071f7e994d2742ed513cd8a1705a88d573c3cae8f82f2b6f31710525

    • memory/812-69-0x000007FEFC251000-0x000007FEFC253000-memory.dmp
      Filesize

      8KB

    • memory/812-66-0x0000000000000000-mapping.dmp
    • memory/1180-74-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1180-77-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1180-83-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1180-81-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1180-79-0x000000000043786E-mapping.dmp
    • memory/1180-78-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1180-76-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1180-73-0x0000000000400000-0x000000000043C000-memory.dmp
      Filesize

      240KB

    • memory/1204-70-0x0000000000400000-0x000000000040A000-memory.dmp
      Filesize

      40KB

    • memory/1204-71-0x0000000004E50000-0x0000000004EC6000-memory.dmp
      Filesize

      472KB

    • memory/1204-72-0x0000000000800000-0x000000000083E000-memory.dmp
      Filesize

      248KB

    • memory/1204-62-0x0000000000000000-mapping.dmp
    • memory/1204-65-0x0000000000300000-0x00000000003B6000-memory.dmp
      Filesize

      728KB

    • memory/1204-68-0x00000000003E0000-0x00000000003F4000-memory.dmp
      Filesize

      80KB

    • memory/1464-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1464-54-0x0000000072BA1000-0x0000000072BA4000-memory.dmp
      Filesize

      12KB

    • memory/1464-55-0x0000000070621000-0x0000000070623000-memory.dmp
      Filesize

      8KB

    • memory/1464-57-0x0000000076581000-0x0000000076583000-memory.dmp
      Filesize

      8KB

    • memory/1464-58-0x000000007160D000-0x0000000071618000-memory.dmp
      Filesize

      44KB

    • memory/1464-85-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1464-86-0x000000007160D000-0x0000000071618000-memory.dmp
      Filesize

      44KB