Analysis

  • max time kernel
    104s
  • max time network
    112s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2023 15:05

General

  • Target

    Request For P.I.docx

  • Size

    10KB

  • MD5

    c4f553758b3b0fb2c3466d4c09bfc9ff

  • SHA1

    24b290a5f4965637d00b5212236e46feb7a54560

  • SHA256

    324280b29e2831413f5e77ddbf2f84dc30fe06533915ba676175d3ed4b415cea

  • SHA512

    15f7a1eceb347af0fabddf7e17d9493452856625332810150b597faf31c0c15a328a6f7ccecd278a8d8808750100ed390877d04656bced9b151e0e9cd264ab08

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOVCZl+CVWBXJC0c3BG:SPXU/slT+LOVuHkZC9U

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5577155192:AAEz6ZTkghx2RsdTxeeE-sDulPHc5WQblVg/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Request For P.I.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:836
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1436
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • outlook_office_path
        • outlook_win_path
        PID:884
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMQAwAA==
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1880

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4ABE69FE-3735-4DBE-9D4B-8F3B0A10C31F}.FSD
      Filesize

      128KB

      MD5

      b1e379ccbd40413143adb481726a8bcc

      SHA1

      8b4364d0a127f0d33c0a572b8eea74517ceac9a7

      SHA256

      51244c228abb9d2dfb4389f96a99d155a747271dc8b8cf108d55f1b049291c3d

      SHA512

      e26e9d55b90a8b88f550fa507266bdeda0458161d9d0de3e7a04d08dfc471179a39bd5e51b76863ab0aae74d981d5ac0fb113d50fcbd3ff24a00568ee1f10eb8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      ddd3c36e4b92319290b398af4d6a30b8

      SHA1

      2964f825a607edc0c74019894fab438d3e3ec748

      SHA256

      0cc1b668bff0c66f8e539073477d23e49363ba2bba8f6dac1b6e675766239be8

      SHA512

      f7fba98cf4940f7a189bee89598bafe7d82f615a5e6840261793a16b3cd509a03e97e8eac8d7d9d079864defb9256e018d566ba624668e4e1035450b477f92ed

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{B97F87DD-6ECB-40D5-A608-DD7151ADB41E}.FSD
      Filesize

      128KB

      MD5

      2a0149a4269469ef29b7033d4b3d6fb6

      SHA1

      2e412ef41f122a85cf2259ab51dcb5ff98c6dc2e

      SHA256

      04bb996d7ce448992f2262dc4fc1b65b832d42b747c7c8143a298a13c34e4a0f

      SHA512

      e2d776443060a6807f0765b6a0cb91c7ac3d217c9afe40d99ff47ed9de0494981142f496051f07e7d3ac93b652479b3b93bffb2678a0a25905bf3f32773467e1

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ACT9UUKV\21u.21u.21u[1].doc
      Filesize

      21KB

      MD5

      8ea90e1943cae504aec33d5403307fc0

      SHA1

      0ae2f56496d8bc971e2b9cd24be55a29982671c3

      SHA256

      57344d71d2c598169157c2d6a81f007695afb1ba260e3e9901e0710098478d59

      SHA512

      cd0a3c7c7ece3ac74fb0880e545f7f668e2fd612f03f00633d70e07828821f69bc0784ce29e97a994d6fe33d4a960f064e1f930738d0bdf8eee3761afb367f4d

    • C:\Users\Admin\AppData\Local\Temp\{D277253F-E255-4007-9A6F-874F929E51AE}
      Filesize

      128KB

      MD5

      f326769de37f52dfe8cc217d1397fc6b

      SHA1

      bc12bb55a2ca11448f381733f4ca9df6fe003ee8

      SHA256

      89280b4432f300b1a5c49bc7a08f3f9cc67eb742a5d8280b585e8f7c8443092a

      SHA512

      a489d0ae0fbe3a4be20b0376553505b123ce29ac2a6da4904bd743ff0c0f67bc486da2d0b5c48af27cfcc758fa91a3d0fef3eb2a1e924a889aebaa7a7f54caeb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      a21d3654802ff82d2d48c34a7a88ea94

      SHA1

      c6a5763dbc4536f8eb91b5ae814e45bd098d927f

      SHA256

      c7ad917bdb163fe42503957ddca7cf2f96eef2763a8427941cf894fb78f54e1b

      SHA512

      f058b37badc9e88fefd302bde7c30ae78a75316bde1303dc837af474f12b7f16759e2623f67f1c0831ad3e75c5b08609009b51f9c3d8527c9bc0d5f7735635e7

    • C:\Users\Public\vbc.exe
      Filesize

      2.3MB

      MD5

      3a3f2df866d5a4345c7a6ff641349864

      SHA1

      92b5b9f8b96717ab2f007da687d4bd8c6f40ae6a

      SHA256

      95de91d762f6d1a9dfcd3b0cfac8a02d54c10a2e5762f8a6643ef81c64115a12

      SHA512

      e25b2fc7589b1dc5afc5ce87f3ffd85f756c85408fce4457885c73f54f4c4093a45e9c8031e9e6adfddef04d3837e873d59f85eeb5030c586c5a0a08eed48972

    • C:\Users\Public\vbc.exe
      Filesize

      2.3MB

      MD5

      3a3f2df866d5a4345c7a6ff641349864

      SHA1

      92b5b9f8b96717ab2f007da687d4bd8c6f40ae6a

      SHA256

      95de91d762f6d1a9dfcd3b0cfac8a02d54c10a2e5762f8a6643ef81c64115a12

      SHA512

      e25b2fc7589b1dc5afc5ce87f3ffd85f756c85408fce4457885c73f54f4c4093a45e9c8031e9e6adfddef04d3837e873d59f85eeb5030c586c5a0a08eed48972

    • C:\Users\Public\vbc.exe
      Filesize

      2.3MB

      MD5

      3a3f2df866d5a4345c7a6ff641349864

      SHA1

      92b5b9f8b96717ab2f007da687d4bd8c6f40ae6a

      SHA256

      95de91d762f6d1a9dfcd3b0cfac8a02d54c10a2e5762f8a6643ef81c64115a12

      SHA512

      e25b2fc7589b1dc5afc5ce87f3ffd85f756c85408fce4457885c73f54f4c4093a45e9c8031e9e6adfddef04d3837e873d59f85eeb5030c586c5a0a08eed48972

    • \Users\Public\vbc.exe
      Filesize

      2.3MB

      MD5

      3a3f2df866d5a4345c7a6ff641349864

      SHA1

      92b5b9f8b96717ab2f007da687d4bd8c6f40ae6a

      SHA256

      95de91d762f6d1a9dfcd3b0cfac8a02d54c10a2e5762f8a6643ef81c64115a12

      SHA512

      e25b2fc7589b1dc5afc5ce87f3ffd85f756c85408fce4457885c73f54f4c4093a45e9c8031e9e6adfddef04d3837e873d59f85eeb5030c586c5a0a08eed48972

    • memory/884-141-0x0000000000F60000-0x00000000011A6000-memory.dmp
      Filesize

      2.3MB

    • memory/884-142-0x0000000004A40000-0x0000000004B96000-memory.dmp
      Filesize

      1.3MB

    • memory/884-143-0x00000000045B0000-0x0000000004642000-memory.dmp
      Filesize

      584KB

    • memory/884-144-0x0000000004BC0000-0x0000000004C00000-memory.dmp
      Filesize

      256KB

    • memory/884-156-0x0000000004640000-0x0000000004670000-memory.dmp
      Filesize

      192KB

    • memory/884-157-0x0000000004BC0000-0x0000000004C00000-memory.dmp
      Filesize

      256KB

    • memory/1232-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1232-201-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1880-147-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1880-148-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB