Analysis

  • max time kernel
    102s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-03-2023 07:00

General

  • Target

    POX010-240.docx

  • Size

    10KB

  • MD5

    1cb238263947b5019937888d3cad8833

  • SHA1

    15d5367bd9cd0fb7fec8ca9ef2360b57a40c63c0

  • SHA256

    3db84a830fee9dea668512769206f1002edf7d27747611f728c14974cd14726a

  • SHA512

    d73cd6a02a2fb6f481a00b7e96d45b7091ac1a5a3fb57763923864fabacb2eb8c945150adf740a64d7d7eae94ac23c9b47b7471fc6e6a9a50f11aca051339748

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uO+A5Wgywl+CVWBXJC0c3hzVG:SPXU/slT+LO+mbywHkZC9K

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    002@frem-tr.com
  • Password:
    jCXzqcP1 daniel 3116
  • Email To:
    002@frem-tr.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\POX010-240.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:360
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1488
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gmRCHGfmw.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1936
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gmRCHGfmw" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:1580
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          PID:568
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1316

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Scheduled Task

    1
    T1053

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      052f9ec24e05d1d4e02e06b4dd9507f4

      SHA1

      f3622165331f541f14abbbdba5a360f591318ef9

      SHA256

      2984965f02436f5c9ce74e08c26d8e4bdbf978ddc4fd1ecbca7f6c56d3c72b34

      SHA512

      8e65290c2b7553ab86e413d225aab4bd0b61108a00b29c0456898ff7fd21d598e50bbbce108bd2b31f6fda9042665f81e54c075f70e3124f01955e4ef53ca147

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{FC43B91B-5F3D-4FCC-A693-00FFE98FFBDD}.FSD
      Filesize

      128KB

      MD5

      8126e47d5e2f24324bbc8227b671d04a

      SHA1

      5a68a48b8066e17be9d4f37dbd7f438ac50c32cd

      SHA256

      92489ef7b9e580ab62234b941ad7b05013013904e316d1b7effdf595e8bf24ef

      SHA512

      e0475dd0721a69d48e276f4fa8b8e5cf01c7c0c982b5771e2e74426c941eaf9c3ac59be55a11d69d8f206066b5cf323b254c1061de7cc4f4f15440a8f3e36a70

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      a0859b3ca3a5c07878c1bc3dd9221437

      SHA1

      56fb90b51bef7bf198777708a52904c254754b5d

      SHA256

      ffb70ef528dd1e05e48033ccb9d69e6920e5fdf85acca9b8086ba3e64a2e930b

      SHA512

      672cad2c7e4cdbe1b226f0ef22b3acfd22fb9ad0771591eb8d8149ec02ee6a595fc6e43f6878f1a19e043dbc41ade508655def18dcf2b3a1313e595210c9dc6e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      741ebcf2dccd2bbf834b01caff073b11

      SHA1

      0df0bff6114d7b504dc413affddbf971333a8b16

      SHA256

      c84c4a14b6ed5d1d5f9bfaa4465a3d52553084353a934858ab327939f5e34438

      SHA512

      cce86daa9608e67a2eff459544d75b09e6cf603d95f85b4c102c9c8fc59f566f0c2d27874baefef20bd63b193b4767bbbeb74d73a4fb5e9f51da502daace4fd5

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DC4C6444-BCB1-4DE8-A572-11D93416C241}.FSD
      Filesize

      128KB

      MD5

      f0ba8f1b90d6fded12baadee98f4cb99

      SHA1

      66ffcd9002cf8bf6ab98baf93321053e5e8a0cab

      SHA256

      e7d6c56cd71ae0f6d9ab50258ccd3c2ca2b5b0432c4b3fa7f5befbf592544ef1

      SHA512

      aba3db56ca2443160a67f1881114cf119543a543ed6c2e54051da2da1da0da6efbd370b0389dc8f35cbd724bc6d7de06a8c6700274bf640f80b64bad38f27d45

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\rr[1].doc
      Filesize

      12KB

      MD5

      dbca576eca2dd4201a06f467ada3d524

      SHA1

      489ea5b066263a10ca81db28eed66545c6d2d4b2

      SHA256

      d90badc8f1680f191a5822f37582cc2e8ed39d044627c071812ad947b8a0a90f

      SHA512

      e48edabcbc2bc1f6d7ad91ffa5cd91e06c77ae7d4b074fb7eb15b20e8afe1f39229cb1be7921b18e3fb94f8c30e20ba61a22d46eafeb70229aa52722d99d7b2d

    • C:\Users\Admin\AppData\Local\Temp\tmp1A17.tmp
      Filesize

      1KB

      MD5

      2dfe08f3ee47da656ba22385a6e085f7

      SHA1

      79c438e0a645fa7bf714a59b6f419e46af637d5f

      SHA256

      8c557bfebc17cb768e3ddff8e2519ba5ebbdbb821973a08f06ab1538013b4cfd

      SHA512

      96380a7f2ba15bb2cca589baed2a36f129868bc37a3d887eadbf02459f2f1d3c05c1c3ebaf1b3b5f9343d0045f1c7cc0fa7d0a92210863b251db4f50530c74e9

    • C:\Users\Admin\AppData\Local\Temp\{5C9D101B-BDBE-4CD7-8920-1435D9A7B6C4}
      Filesize

      128KB

      MD5

      f2d7d7559ef3b630eee4ad9b2220d255

      SHA1

      f9e8fb2699cd5f51f10188d530d3cc527151d1a1

      SHA256

      912cdbf8789f99ba1d324127f130b02a3cf938d6cc0c3ecf3440fb94b52858e2

      SHA512

      b215351a7c2a0e4de376730e3ef26f7aafbbc5493e83de7b35fdf052d6882fb1f5c95eb4d469bcdaff395ed551156f25656eac1d11e36e73d955dfb64ea23407

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      105B

      MD5

      ef5c93397775c0240daba47626ee0b22

      SHA1

      e64cb17cb9e1af3a3d7689f786436873005c2a12

      SHA256

      fc0ea4509f1e1c815f59e36b6d991d21e4aaf220b17985f27b8cd566d9e8b9d7

      SHA512

      8bbd258c2696f41fdf4367adfbde9b96583479c7ab3d0c516edd3b4ecea4dcdbabdbacb85dd5264609f374b6f9ed38d47bd5c351e30bac8ee9f0757feee022fd

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      d91bf19fdabe71bac54559f2ffd9a0dd

      SHA1

      a13e7ab25ae6df36ef64faebc718a758864d2f9a

      SHA256

      7460ae6d2231ecda0b194508308e757a375af4da5ce4e979645a7764fa680dc4

      SHA512

      630a1b0955d9edded5b0393a2e2296280f7e115e7175cf1b56882fe1b787c74f4c9516927d3028784f5435db193c09e9716cf940e4b0c9a2b380f0696cb22e3b

    • C:\Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • C:\Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • C:\Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • C:\Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • C:\Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • \Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • \Users\Public\vbc.exe
      Filesize

      977KB

      MD5

      0bbeb58e735d6bd4d0d30f150c36a15e

      SHA1

      8f63aa459a56f8fb80105e78537ef8189f1b92d6

      SHA256

      efd5a5231f12bcaa48f701b82ff32314b313e5484fabe8596a7ce9283a08f71c

      SHA512

      ac69a141e676a6115456db98b4d69dc7ffbcbb0001dc4d5a37259dbab1bacf7fb07712253f515e1848923665ce5d325c73276dfe0894f78e64e8d02422091c27

    • memory/1248-207-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1248-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1316-169-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-171-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-179-0x0000000000440000-0x0000000000480000-memory.dmp
      Filesize

      256KB

    • memory/1316-176-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-174-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-166-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-167-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-168-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1316-170-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1488-155-0x0000000007F30000-0x0000000007FDA000-memory.dmp
      Filesize

      680KB

    • memory/1488-153-0x0000000004E00000-0x0000000004E40000-memory.dmp
      Filesize

      256KB

    • memory/1488-152-0x0000000000620000-0x000000000063A000-memory.dmp
      Filesize

      104KB

    • memory/1488-154-0x00000000005C0000-0x00000000005CC000-memory.dmp
      Filesize

      48KB

    • memory/1488-162-0x00000000012F0000-0x0000000001322000-memory.dmp
      Filesize

      200KB

    • memory/1488-161-0x0000000000D80000-0x0000000000D86000-memory.dmp
      Filesize

      24KB

    • memory/1488-146-0x0000000004E00000-0x0000000004E40000-memory.dmp
      Filesize

      256KB

    • memory/1488-145-0x0000000001320000-0x000000000141A000-memory.dmp
      Filesize

      1000KB

    • memory/1936-177-0x0000000000490000-0x00000000004D0000-memory.dmp
      Filesize

      256KB

    • memory/1936-178-0x0000000000490000-0x00000000004D0000-memory.dmp
      Filesize

      256KB