Analysis

  • max time kernel
    140s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    09-03-2023 05:39

General

  • Target

    SOA.docx

  • Size

    10KB

  • MD5

    acdde6c86a6da4bc93805cd855022b1c

  • SHA1

    512ccadb3c7ea94b29171ef5dc00c149621472ca

  • SHA256

    532f654c0356db6de0e2b4d949afc2186b8055d35f9ea262eea09a4408cc3185

  • SHA512

    9400d0a8a9589e8e136f6a63c660445f3425666a53581b3fda3d7c603996bc737e7fde746a886fa2532fed6ae7f7abda0205a7c1deaa561071fee847c4720782

  • SSDEEP

    192:ScIMmtP1aIG/bslPL++uOfNl+CVWBXJC0c3g5R:SPXU/slT+LOfNHkZC9gL

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5940813834:AAF8mKehOQ2jtgluy4NISP8DYRvxgz__xCQ/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SOA.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1556
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:696
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2040
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1812
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1672

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Collection

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{44FC5D0F-712C-4A37-AD1F-C8E1734E78DC}.FSD
      Filesize

      128KB

      MD5

      370f3f29e97f60f180df6340453c2a63

      SHA1

      02a2fa61fa79e47606e72bfe94ae49a12bf0be30

      SHA256

      3e29ad229b6575fa2f0bc34871916665781c05e015d9c5e439051a400ab4942b

      SHA512

      00ba8266a4e0bb629a31f3644c705ac5076d01c44e3791e20d8e41e24256e071950ca4e09b10a94fcf4cd64e4b3dd789c823a9b7494bac63d5f29c67e5e0f046

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      f4317b08ba3615471d403bf5d8b96a50

      SHA1

      4251a176f66cdf74f283a9f890567de79cd47bda

      SHA256

      3b3c8a61e9373ac5c9f41fdf435eacaa1cda0cee4a916a02ba68428160d2707f

      SHA512

      597c4587f59f23de675197c842dd4afc8310612b64a22a95ac5fdf4dcbf9755edb8bdea28dc11958da1db7baab9fce27588c3bafd159765ec21b981a930ea999

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{74293818-368C-4064-999E-F1A199446F31}.FSD
      Filesize

      128KB

      MD5

      0fd00dd05ddc154b80af561e40b54a7e

      SHA1

      945c3ce91919843454afe54f92fd97b6b36ca2bf

      SHA256

      58205e41939e408d2246591dfb6fbf4c2d4c26f94f7013ffa6c94470d70af9fe

      SHA512

      7159440497bdf4f53c81b5d6c768c8f3c4f4cd50f4db19a9e1855f011c6898fc29930315cdec3b183b01eb55a34b08580a986d84989201defd00806cd0adb4b6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\79.79.79[1].doc
      Filesize

      11KB

      MD5

      097b922130a3687dc3406def32a98c89

      SHA1

      f7190d93e5c193c17c2ed773fcb78dab223c6821

      SHA256

      8e41a7444f467d9f4c421a7506c8cdc48e0d706e53049ce05c34caee65e1fb67

      SHA512

      43e142557b0eb66bb8be7373e61d73aee1609c627a4eb39b9831253eb37e7411e1187b0464b34646fcbad492bd4b085722c50c04c99ab5538f8cd58ea5fbf01a

    • C:\Users\Admin\AppData\Local\Temp\{E4A44727-36CC-42A1-ABAA-5EE65A8B94D6}
      Filesize

      128KB

      MD5

      f25f28bc5fad784e3c89e9023deb3705

      SHA1

      3c1a4e4386c0f04540c21f0fa530b21045c980e3

      SHA256

      362bec0dc9bf47c44e872fcec4c341c1d5195e589b97fc97320d2592713b9ecf

      SHA512

      7a9acd2369401e65eb246f97dc5f7761772dafeecdb93e038518d8bf6b286ec95e6a55639b4911a9fd6f21b1362ad1dbbd6f861338655fbd46002e57fcb641c6

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
      Filesize

      55B

      MD5

      d5ff6aa3b84579e67283f72dac55acff

      SHA1

      c4f932cd2833a20fdab5dd39c50df911d1c86aad

      SHA256

      f7c002fff6c8b1c75eda8f48aade5740c6e131aa69edc27f0fe80f604c5a798f

      SHA512

      602aef14c93777700ae1bcc1dff94ece05990f065f620d2256ce0b22b73443041a30f3516ffef4fa41ab0acef73ce671f9753d5c5d5f1211bfc2cbe891041e38

    • C:\Users\Public\vbc.exe
      Filesize

      864KB

      MD5

      17764f0a8189a2f85bdbac3e1e820fb4

      SHA1

      01ba8cd49ff6630c785dd19d8ac7178d04b933c6

      SHA256

      66dd32f474fc8d66ed8f602bb8041f9a23a1300d646e27b5f08e732cd1a44531

      SHA512

      97b3d13b90aa5716293ec7b9891822453d4be1732f6f29cb78d80fda44f0ca71f14ed9abff0bb1fc3092e43a82be26146fbc6822db84b2234c45fbdbed7fcf98

    • C:\Users\Public\vbc.exe
      Filesize

      864KB

      MD5

      17764f0a8189a2f85bdbac3e1e820fb4

      SHA1

      01ba8cd49ff6630c785dd19d8ac7178d04b933c6

      SHA256

      66dd32f474fc8d66ed8f602bb8041f9a23a1300d646e27b5f08e732cd1a44531

      SHA512

      97b3d13b90aa5716293ec7b9891822453d4be1732f6f29cb78d80fda44f0ca71f14ed9abff0bb1fc3092e43a82be26146fbc6822db84b2234c45fbdbed7fcf98

    • C:\Users\Public\vbc.exe
      Filesize

      864KB

      MD5

      17764f0a8189a2f85bdbac3e1e820fb4

      SHA1

      01ba8cd49ff6630c785dd19d8ac7178d04b933c6

      SHA256

      66dd32f474fc8d66ed8f602bb8041f9a23a1300d646e27b5f08e732cd1a44531

      SHA512

      97b3d13b90aa5716293ec7b9891822453d4be1732f6f29cb78d80fda44f0ca71f14ed9abff0bb1fc3092e43a82be26146fbc6822db84b2234c45fbdbed7fcf98

    • \Users\Public\vbc.exe
      Filesize

      864KB

      MD5

      17764f0a8189a2f85bdbac3e1e820fb4

      SHA1

      01ba8cd49ff6630c785dd19d8ac7178d04b933c6

      SHA256

      66dd32f474fc8d66ed8f602bb8041f9a23a1300d646e27b5f08e732cd1a44531

      SHA512

      97b3d13b90aa5716293ec7b9891822453d4be1732f6f29cb78d80fda44f0ca71f14ed9abff0bb1fc3092e43a82be26146fbc6822db84b2234c45fbdbed7fcf98

    • \Users\Public\vbc.exe
      Filesize

      864KB

      MD5

      17764f0a8189a2f85bdbac3e1e820fb4

      SHA1

      01ba8cd49ff6630c785dd19d8ac7178d04b933c6

      SHA256

      66dd32f474fc8d66ed8f602bb8041f9a23a1300d646e27b5f08e732cd1a44531

      SHA512

      97b3d13b90aa5716293ec7b9891822453d4be1732f6f29cb78d80fda44f0ca71f14ed9abff0bb1fc3092e43a82be26146fbc6822db84b2234c45fbdbed7fcf98

    • memory/1556-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1672-159-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-160-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-185-0x0000000004C40000-0x0000000004C80000-memory.dmp
      Filesize

      256KB

    • memory/1672-167-0x0000000004C40000-0x0000000004C80000-memory.dmp
      Filesize

      256KB

    • memory/1672-166-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-164-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-162-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-157-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-158-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1672-161-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1812-155-0x0000000007D40000-0x0000000007DEA000-memory.dmp
      Filesize

      680KB

    • memory/1812-145-0x0000000000900000-0x00000000009DE000-memory.dmp
      Filesize

      888KB

    • memory/1812-156-0x0000000001F70000-0x0000000001FA2000-memory.dmp
      Filesize

      200KB

    • memory/1812-147-0x00000000007B0000-0x00000000007F0000-memory.dmp
      Filesize

      256KB

    • memory/1812-154-0x00000000007F0000-0x00000000007FC000-memory.dmp
      Filesize

      48KB

    • memory/1812-153-0x00000000007B0000-0x00000000007F0000-memory.dmp
      Filesize

      256KB

    • memory/1812-152-0x0000000000790000-0x00000000007A4000-memory.dmp
      Filesize

      80KB