Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2023 14:25

General

  • Target

    PO 010-240.docx

  • Size

    10KB

  • MD5

    84b25af93d91ad40962a0db9403cc644

  • SHA1

    d38e907dfbe22b0e0eb7ab7ae8515eb69a7dddbc

  • SHA256

    da53bd57af58ae908cd30e303113930cecbd995719404e2dbd7009f0bc54926d

  • SHA512

    ff3b085bde3ccff0592453ded391daac66819d5c8ad3035cb7c567891528ceb0c014c3265f8735cfa780de5d06c746a24f2d1504d669fbd17660f42ab855437c

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOw4Nl+CVWBXJC0c3qe:SPXU/slT+LOw6HkZC9h

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    002@frem-tr.com
  • Password:
    jCXzqcP1 daniel 3116
  • Email To:
    002@frem-tr.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PO 010-240.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:980
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:484
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\iygpxcCSjijj.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:960
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\iygpxcCSjijj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2B07.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:1548
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1640

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Scheduled Task

    1
    T1053

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{72E3EE97-8BF5-4DA3-9535-20ADF3F799C4}.FSD
      Filesize

      128KB

      MD5

      8294f86fcb2c759f625e262887c3cce5

      SHA1

      ef385f056f021b1ce9d1918a725dc9b986b39ac1

      SHA256

      49f9cc79f15d58c27a317b9e33a6c675b9898410cdc636d37fd635d7d718eba8

      SHA512

      0e3b77b868a6458340cd3b363e2d259fc397febffda52438491b0b661616679dd3643010a6553b2363b612a313002024e63fd0298f263f3a555ae2c1f5a6884e

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      8c2e34ca99f05d9fd3f5e4fbe8fa52bc

      SHA1

      aede97bf87c364415e418cd2a2fef1377b5c16f9

      SHA256

      04c0e998afad308ef732a35460754ba7a70128a5edf49079c490b903a67d3f93

      SHA512

      8fffa1692c96be78d3caab9a095f002a32017ea4e6140ea4ef5cc67819d3da09e7194f470911050c4a74d2a676c37de7c5830343f43358d7fbf0a08b9f214592

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{0C2E4E9E-8A5D-4E26-A5D5-ED4D4339BC91}.FSD
      Filesize

      128KB

      MD5

      a4e5fd16ff5597f10e464158b9266d40

      SHA1

      e76d1f3247cfac0f6b551848df5e80bbd69561fe

      SHA256

      fad5568835b17dbf2da14f71ecf0744a004d096c1bc6072b9a915197f21d2b95

      SHA512

      7095edbcb8959bae9394a01c5976538ba2f0f2cb4ac7bc50bbdaf5cf98ddc4413021dee457b92c1bd9868660e2237ff703601a992e94a4dddc57eb187b9e4a3b

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\bg[1].doc
      Filesize

      12KB

      MD5

      ba628c629f3472e3b57de14e3cdb05d2

      SHA1

      b492c03cb6824682d575a6b77e3c1c3b7755a331

      SHA256

      e399cdab404d5046aba55ff32346f96349d482763a3b1c633c9a8fb594f09a17

      SHA512

      41fd46f514437a823eef56dd83adf3e8e2f7270ca1a24734a3f639ba3f82db55c170d5056854832602d65e75f2d5772847fbd18e8f9531fc406e8aa62db63cfb

    • C:\Users\Admin\AppData\Local\Temp\tmp2B07.tmp
      Filesize

      1KB

      MD5

      1ceb1788c847229f921cf27a602e7a55

      SHA1

      1d2b6e02e6c0a7949a6bce9d5379058fc07e0cfc

      SHA256

      fc47d872c799921b8e56959e9d8b894b822c54a515ca200633223f46f6d56541

      SHA512

      d6b39fc548bd9ca11ac2aa5447e56e7b04263b7ced840ab858948ca6bd21acd717b931dd16f2a5e0427005f03d088fe15766f1a33226a6ba1a9fee993651dc55

    • C:\Users\Admin\AppData\Local\Temp\{D7B27D05-4816-4E66-8AFF-AC258304C043}
      Filesize

      128KB

      MD5

      a89830b02d38d0bcb5b6f647502cfda8

      SHA1

      f2c35616d70c6be50864395e4278065605dbd88a

      SHA256

      3402d77408eedf2eb33f3641caaf0557582bf6254b234b3870c977c55caaf153

      SHA512

      5c0c86473848161d588e84f3d8f2afba6bb45ecfef7d64b0882fe96e7b528ad2a1b4d50c37f1fb921004225a03f4789d9d681d696b9ada680bfac8a8c00bc1e1

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      a5b715d23dc73414945c461203a0b368

      SHA1

      bb0969750e0298f75beee848c2bf5433af322fc9

      SHA256

      40329570c7ff0c06816421240018ca8e2aea81fd157f0f5446f13e83033af6cb

      SHA512

      d35a5fb5b2879e6cbd26b0fd45903869fb51307d9536626dd08aac7fb2d1ad817fe0d36e9fba5904d26bf4839f6157c240aeac626eca5ea8dd3cfe8dd48853ea

    • C:\Users\Public\vbc.exe
      Filesize

      1.1MB

      MD5

      131ff0ef35352e56cef2893ab1260c3d

      SHA1

      8cae139353e77e1e4bd08f86934160f9f23cffa9

      SHA256

      8c428b36093ad04e27a3ad86f06c716a9de37b502428211ecc15466fda55068b

      SHA512

      1b58c4a27bff9b3c82e531da84b3a03a8aeead32b5bec9c58fb3053de750a303b59aff7625061db824f44cf43f8164c47f8b7b4b2a27066985d75f60649b43c0

    • C:\Users\Public\vbc.exe
      Filesize

      1.1MB

      MD5

      131ff0ef35352e56cef2893ab1260c3d

      SHA1

      8cae139353e77e1e4bd08f86934160f9f23cffa9

      SHA256

      8c428b36093ad04e27a3ad86f06c716a9de37b502428211ecc15466fda55068b

      SHA512

      1b58c4a27bff9b3c82e531da84b3a03a8aeead32b5bec9c58fb3053de750a303b59aff7625061db824f44cf43f8164c47f8b7b4b2a27066985d75f60649b43c0

    • C:\Users\Public\vbc.exe
      Filesize

      1.1MB

      MD5

      131ff0ef35352e56cef2893ab1260c3d

      SHA1

      8cae139353e77e1e4bd08f86934160f9f23cffa9

      SHA256

      8c428b36093ad04e27a3ad86f06c716a9de37b502428211ecc15466fda55068b

      SHA512

      1b58c4a27bff9b3c82e531da84b3a03a8aeead32b5bec9c58fb3053de750a303b59aff7625061db824f44cf43f8164c47f8b7b4b2a27066985d75f60649b43c0

    • C:\Users\Public\vbc.exe
      Filesize

      1.1MB

      MD5

      131ff0ef35352e56cef2893ab1260c3d

      SHA1

      8cae139353e77e1e4bd08f86934160f9f23cffa9

      SHA256

      8c428b36093ad04e27a3ad86f06c716a9de37b502428211ecc15466fda55068b

      SHA512

      1b58c4a27bff9b3c82e531da84b3a03a8aeead32b5bec9c58fb3053de750a303b59aff7625061db824f44cf43f8164c47f8b7b4b2a27066985d75f60649b43c0

    • \Users\Public\vbc.exe
      Filesize

      1.1MB

      MD5

      131ff0ef35352e56cef2893ab1260c3d

      SHA1

      8cae139353e77e1e4bd08f86934160f9f23cffa9

      SHA256

      8c428b36093ad04e27a3ad86f06c716a9de37b502428211ecc15466fda55068b

      SHA512

      1b58c4a27bff9b3c82e531da84b3a03a8aeead32b5bec9c58fb3053de750a303b59aff7625061db824f44cf43f8164c47f8b7b4b2a27066985d75f60649b43c0

    • \Users\Public\vbc.exe
      Filesize

      1.1MB

      MD5

      131ff0ef35352e56cef2893ab1260c3d

      SHA1

      8cae139353e77e1e4bd08f86934160f9f23cffa9

      SHA256

      8c428b36093ad04e27a3ad86f06c716a9de37b502428211ecc15466fda55068b

      SHA512

      1b58c4a27bff9b3c82e531da84b3a03a8aeead32b5bec9c58fb3053de750a303b59aff7625061db824f44cf43f8164c47f8b7b4b2a27066985d75f60649b43c0

    • memory/484-155-0x00000000055D0000-0x000000000567A000-memory.dmp
      Filesize

      680KB

    • memory/484-145-0x0000000000E20000-0x0000000000E60000-memory.dmp
      Filesize

      256KB

    • memory/484-154-0x00000000002E0000-0x00000000002EC000-memory.dmp
      Filesize

      48KB

    • memory/484-144-0x0000000001030000-0x0000000001154000-memory.dmp
      Filesize

      1.1MB

    • memory/484-146-0x0000000000560000-0x000000000057A000-memory.dmp
      Filesize

      104KB

    • memory/484-161-0x0000000000C20000-0x0000000000C26000-memory.dmp
      Filesize

      24KB

    • memory/484-164-0x0000000004670000-0x00000000046A2000-memory.dmp
      Filesize

      200KB

    • memory/484-153-0x0000000000E20000-0x0000000000E60000-memory.dmp
      Filesize

      256KB

    • memory/960-177-0x0000000002720000-0x0000000002760000-memory.dmp
      Filesize

      256KB

    • memory/960-178-0x0000000002720000-0x0000000002760000-memory.dmp
      Filesize

      256KB

    • memory/1396-207-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1396-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1640-167-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1640-173-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1640-166-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1640-175-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1640-165-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1640-176-0x0000000004D50000-0x0000000004D90000-memory.dmp
      Filesize

      256KB

    • memory/1640-169-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1640-180-0x0000000004D50000-0x0000000004D90000-memory.dmp
      Filesize

      256KB

    • memory/1640-168-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1640-170-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB