Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    01-03-2023 07:53

General

  • Target

    PO_03012023.docx

  • Size

    10KB

  • MD5

    2f1d7d1c6a4ac4baab35d66d028fd45c

  • SHA1

    a55ecbd8553b44f1eebe3e414179cc1e0824834e

  • SHA256

    55066756eb5b31eaf5b403b5c8e2578fcc42f030af664ea7aa2bb7d9285e7945

  • SHA512

    910605889f126872b94538c8d4d9beeb1795b78b3ff9f89142789ab76add819f0f14da82e47971206cb2a2eade68cd8d59ee0f489853f80c2eefd928ce95d67d

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOmXl+CVWBXJC0c3eu:SPXU/slT+LOsHkZC9d

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO_03012023.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:820
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:612
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1332

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{F41CB166-B76F-44D3-9DE1-A27201864B0E}.FSD
      Filesize

      128KB

      MD5

      66a3fce4e331bfb840a9cc971d3856ba

      SHA1

      0a4f32a691cf0e5e43914da4162f462a53d54466

      SHA256

      3162353fc85ada4694afb8b98af7c00da43f2a11c72abf5a5e09472c648f78e8

      SHA512

      674a7d8cb73c83e5b2014147a6925621f933f75f5831692232bd66ef066093f1777b20934e736e6a89172b937566771f8d12831fcdfaa523f91b0eba10c85093

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      a21e41a22382b1dae37bbb5946c07742

      SHA1

      632968082a57e39770e85940d3f6818787258d75

      SHA256

      a22c76dd220d1ca6d3d00573a1cd808711f73a1a233ca70adacddd21f9faea01

      SHA512

      db4700c7390e5a1b7856b2fb42086cd99653d75a0f9e29276e59e3f6a49e56958bddea51bedde89e3e267f607c72bc8ac4fd1abfb58c34864a4223d08b0b6320

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{227CB708-90B5-4045-B0DD-29F73DC612BF}.FSD
      Filesize

      128KB

      MD5

      6fbcd4d14ec1d34c5cb740c5c1ed0a22

      SHA1

      d53e4cea0245cf4297933e4bd6177d5932a1d824

      SHA256

      c517cc7ac4d07a61398449e0334cdcabbad9e48f2ce2b0b1528cce14cb776ee2

      SHA512

      99d2a19db00f59f62a4c0c7be69ecfe6267ac5ad1d596180131683316a011bbabea980493bf395849983599c9e29a8fd36d47116672e6bf227d3ee0f1ce8506c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EV74ZOZO\ccc[1].doc
      Filesize

      27KB

      MD5

      f8f82f3001bd94c4ed0a3a7affd651b6

      SHA1

      65f7b9ad001b3b7d0bdd40f9dc8f2823e82d3907

      SHA256

      4932f4e28d728c155ad2ab326d5d246b43804e861e7fe00e172f0a8c4e937433

      SHA512

      0ff5e06ee729ecb832a7f64ab42f300ffbfe09d3dfb16a5f9a2334ab11b6b9cf64df2b7bf5e406b54f141199bdf252d7884df70881c9d5faa7fd6dfaadef30e4

    • C:\Users\Admin\AppData\Local\Temp\{38150DA0-AFC4-4503-B58C-F533BE8E8EF5}
      Filesize

      128KB

      MD5

      e66be84f413b7efc7b1676eeba744a92

      SHA1

      34fe1da01bb96ed18a264800cdd5da14ea78eb24

      SHA256

      5ca1813fd30fc7f5a935f47f459527fd68e8896abfd5628adc901852fa010378

      SHA512

      e3f4e67b79ab44fb0f0583de021d68d60720fcff87accf09ee11a30a5b35d314da6061209cea38be3c680e77c449e646f71027bc4215c45a32725ad2625cded5

    • C:\Users\Public\vbc.exe
      Filesize

      472KB

      MD5

      9fb57d87d4e4c3aae74d5c28151a37aa

      SHA1

      9a039786c2321a532994ff68d05a0424be124901

      SHA256

      98d7b8e09a00fd110bafd71e9810364b27e5626116b6b4b55bde332e468e374a

      SHA512

      0954b1bfb4cadcd937befb5f6c7c57352a7a255d77e07fcfc5c3965c7739d4c6b78e52afcaa4ca96347dde5b8ad5284115c50989d236ea5d9322f94947126044

    • C:\Users\Public\vbc.exe
      Filesize

      472KB

      MD5

      9fb57d87d4e4c3aae74d5c28151a37aa

      SHA1

      9a039786c2321a532994ff68d05a0424be124901

      SHA256

      98d7b8e09a00fd110bafd71e9810364b27e5626116b6b4b55bde332e468e374a

      SHA512

      0954b1bfb4cadcd937befb5f6c7c57352a7a255d77e07fcfc5c3965c7739d4c6b78e52afcaa4ca96347dde5b8ad5284115c50989d236ea5d9322f94947126044

    • C:\Users\Public\vbc.exe
      Filesize

      472KB

      MD5

      9fb57d87d4e4c3aae74d5c28151a37aa

      SHA1

      9a039786c2321a532994ff68d05a0424be124901

      SHA256

      98d7b8e09a00fd110bafd71e9810364b27e5626116b6b4b55bde332e468e374a

      SHA512

      0954b1bfb4cadcd937befb5f6c7c57352a7a255d77e07fcfc5c3965c7739d4c6b78e52afcaa4ca96347dde5b8ad5284115c50989d236ea5d9322f94947126044

    • \Users\Public\vbc.exe
      Filesize

      472KB

      MD5

      9fb57d87d4e4c3aae74d5c28151a37aa

      SHA1

      9a039786c2321a532994ff68d05a0424be124901

      SHA256

      98d7b8e09a00fd110bafd71e9810364b27e5626116b6b4b55bde332e468e374a

      SHA512

      0954b1bfb4cadcd937befb5f6c7c57352a7a255d77e07fcfc5c3965c7739d4c6b78e52afcaa4ca96347dde5b8ad5284115c50989d236ea5d9322f94947126044

    • memory/612-141-0x0000000001140000-0x00000000011BC000-memory.dmp
      Filesize

      496KB

    • memory/612-142-0x0000000000C90000-0x0000000000D0A000-memory.dmp
      Filesize

      488KB

    • memory/612-143-0x0000000000DE0000-0x0000000000E72000-memory.dmp
      Filesize

      584KB

    • memory/612-144-0x0000000000D60000-0x0000000000DA0000-memory.dmp
      Filesize

      256KB

    • memory/612-155-0x0000000000D60000-0x0000000000DA0000-memory.dmp
      Filesize

      256KB

    • memory/612-157-0x0000000000E70000-0x0000000000EA0000-memory.dmp
      Filesize

      192KB

    • memory/1040-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1332-148-0x00000000026A0000-0x00000000026E0000-memory.dmp
      Filesize

      256KB

    • memory/1332-147-0x00000000026A0000-0x00000000026E0000-memory.dmp
      Filesize

      256KB