Analysis

  • max time kernel
    101s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2023 12:34

General

  • Target

    transferencia.docx

  • Size

    10KB

  • MD5

    b71a4eadd0fa49510df132d011f6d736

  • SHA1

    90b2734bd8f080838d401a25ed3fddec066b5c5f

  • SHA256

    63d81262d8b022c5c67b24e394a32037bc0cf41869444152c48ee204d84386a3

  • SHA512

    8d3c0dd8c30cabb702f012753966022bb7fb0745469c979c5f542d2c9daf0d95cbb7752fb7f3458054a4a44446dedf685e72e99bc5a6a1373561134261a56672

  • SSDEEP

    192:ScIMmtP0xfUW70vG/b3kgOi4O7+us+1pReDnc378Vx6T:SPX+si10ni4O78yeDnM4VsT

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5851500456:AAGR5SiDXSkn8lCoZA-eArnoTA9CuFr-jC0/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\transferencia.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1980
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:816
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1648
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:864
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Public\vbc.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1872
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1012
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:1708
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1092

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      97291dacecc622180fe2ba4b556d33fc

      SHA1

      11b712a33d101a041fc72759677a89d374da4c7c

      SHA256

      889aeeaee3d49412efba19646f7c80701f57e881ef1b30d5a76b148d5b6a3d1c

      SHA512

      d4e13b640d12b7a6e5a0ab8abbd3c3dbae0280da2c070a033854070a872019aee40a3bc84fb9dc7e0b4c1b84ebe39cd2e1cd2284285c04685571640706375fd1

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{FD2FBED3-9BEC-4B38-A3C4-470CA7B44B63}.FSD
      Filesize

      128KB

      MD5

      8850f128d3d7512cb304cf14c0b1a95e

      SHA1

      fc1cc7ad7cf869c98ffb484492f0cddb032156e7

      SHA256

      ce9063df487d7dd3cb7373d3135f1dde243ad42e6a0c2595747e812e121b86de

      SHA512

      7142ab530c56dbecaf94e9add93d8783ee6fbdbe3ce99a346fbacc5a69633ef0e549ba6e932b51d3617de0e6190860982007a02c447a9212ef2408b473db8512

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UOYUJSME\O-O-OOO[1].doc
      Filesize

      14KB

      MD5

      7f0575ad2474f43d494f501f380e2421

      SHA1

      4ed0e1b0bbe26e18272867ee56135d0b6db8b1a7

      SHA256

      20df06eac0646a854a74337a706c39a5583f24f6bbd1836b344f5614a46a0e92

      SHA512

      87d7a008cf1a70c082475a846c829c7ffc56ae4302a8ccad434760851b09d85fb845e8c9c363b7d1a2a8cda52a6e5fe4276f5f2a5923a1e88a6709a3a1e95dd4

    • C:\Users\Admin\AppData\Local\Temp\Cab45E9.tmp
      Filesize

      61KB

      MD5

      fc4666cbca561e864e7fdf883a9e6661

      SHA1

      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

      SHA256

      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

      SHA512

      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

    • C:\Users\Admin\AppData\Local\Temp\{6BCA17FA-ADC3-4137-93D0-9BAF79F6BB62}
      Filesize

      128KB

      MD5

      357a200d2646f5f74bfd1f7f9f1c5501

      SHA1

      ff5d02a6baa19adc8ce9725ec07504fa151f5e96

      SHA256

      358a56981ff944d9ea9fb68f6bd140221e6b103172461bb9d9a91c5082ae24db

      SHA512

      b99106a8580a8e5e3af63792dcdd6a913e25c9f25e1399f623fa0c2800d28edf275aff94544d1a4e0d16f9bf23c294c1a99adb7302bfdfa27af9f112b11cdc41

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      c21a2d63d59b6d9ff8076a796533ca2e

      SHA1

      d49b73d8188edafc23887847e0acbbec5154e24e

      SHA256

      df58eda2296ee80590d294acfc186102818be00f62259fcf70bbdea56b6d3fa0

      SHA512

      063d384f6830dd85f347c240f2a22f8ed6d34a459ab8705369f95d5e4aa0e10445ecc5e7cb84adf9cf5d3d1ed4df1b809968738d710f944b376dac6d8793aab8

    • C:\Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • C:\Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • C:\Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • C:\Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • C:\Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • C:\Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • \Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • \Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • \Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • \Users\Public\vbc.exe
      Filesize

      1.2MB

      MD5

      c3a5814b7c004f0a958c3da9d18d8d6a

      SHA1

      015e9b9a34e7c09beee480182dc3d5d292bedb35

      SHA256

      ecc2b212fb51d9d740f048286236846849658396bb8203b28957d5918a87f35b

      SHA512

      fed517bd8ec446fb2b4ea638daca2ae7481edf4798481562c7461ea5c8986c86923b541dc7b88238a4b48104368016ea9723fb21d0211cafa4f959a6ee5f7944

    • memory/864-151-0x0000000000650000-0x0000000000666000-memory.dmp
      Filesize

      88KB

    • memory/864-158-0x0000000004D60000-0x0000000004DA0000-memory.dmp
      Filesize

      256KB

    • memory/864-159-0x0000000000670000-0x000000000067C000-memory.dmp
      Filesize

      48KB

    • memory/864-160-0x0000000005ED0000-0x0000000005FC8000-memory.dmp
      Filesize

      992KB

    • memory/864-161-0x0000000001E60000-0x0000000001ED4000-memory.dmp
      Filesize

      464KB

    • memory/864-150-0x0000000004D60000-0x0000000004DA0000-memory.dmp
      Filesize

      256KB

    • memory/864-149-0x0000000000030000-0x0000000000160000-memory.dmp
      Filesize

      1.2MB

    • memory/1092-168-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1092-166-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1092-167-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1092-169-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1092-172-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1092-174-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1092-177-0x0000000004D80000-0x0000000004DC0000-memory.dmp
      Filesize

      256KB

    • memory/1092-165-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1092-201-0x0000000004D80000-0x0000000004DC0000-memory.dmp
      Filesize

      256KB

    • memory/1092-164-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1872-178-0x00000000026D0000-0x0000000002710000-memory.dmp
      Filesize

      256KB

    • memory/1980-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1980-228-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB