Analysis

  • max time kernel
    102s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 02:23

General

  • Target

    016d1da2f0244ac3bbc392caace0d8ff5fd1870e6c627802d2e8b09c39e393a3.rtf

  • Size

    35KB

  • MD5

    c5f03dfe714e81188bc7c6a681b48147

  • SHA1

    3fa716a9f1781eb63de8987d0a176c840643c3f9

  • SHA256

    016d1da2f0244ac3bbc392caace0d8ff5fd1870e6c627802d2e8b09c39e393a3

  • SHA512

    781bdad3e8643ba187110b153cc8982c2809cb0ba0346a9c90a7121be5e583b719b22e5d404ee405812c0cce1355b2485a9b25b120c2ac0d025acd996e6838fa

  • SSDEEP

    768:7Fx0XaIsnPRIa4fwJMJhpUMEuKNzE9apsX2RSbRqPqBhvb/d1:7f0Xvx3EM9zElNzDsNBtb/r

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.ungaplc.com
  • Port:
    587
  • Username:
    info@ungaplc.com
  • Password:
    Maco@2022@
  • Email To:
    afnrobertaol@gmail.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\016d1da2f0244ac3bbc392caace0d8ff5fd1870e6c627802d2e8b09c39e393a3.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1728
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe
        "C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1820
        • C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe
          "C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Adds Run key to start application
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:1788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      2bd5f8a8465235d5b6b2d8cabf3d1846

      SHA1

      1f20270fe817bb3480659877cbd67dda37c7b73a

      SHA256

      92d27f8dfc6e6dcdd53e03cc8702b814ce6bc710163f9bd62008dd4882843d22

      SHA512

      0ed333b63ea674481f0bfc57462182bb68bf3edf0577821e14487129112a4e6b077116eb85a2e73aeabe85544ac64bd184e385ec72c173d021ade5a363403221

    • C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe
      Filesize

      795KB

      MD5

      4519de9e3f5efd9400ddfdea287b5daf

      SHA1

      3caede68f0bd9e89b241c73064dd75a29095b422

      SHA256

      6c8b93bdd0153dfe2c4ff9e4c758ec44f3e01fbb77cb54b51e7ed07efa734a44

      SHA512

      656a759aee1b28d470bf32368e4d0372786515a1477730e3e790e642242ec4d801180361ff79af85d7d99164e6686823ebb85ee36ccbd612065d5a14d389004c

    • C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe
      Filesize

      795KB

      MD5

      4519de9e3f5efd9400ddfdea287b5daf

      SHA1

      3caede68f0bd9e89b241c73064dd75a29095b422

      SHA256

      6c8b93bdd0153dfe2c4ff9e4c758ec44f3e01fbb77cb54b51e7ed07efa734a44

      SHA512

      656a759aee1b28d470bf32368e4d0372786515a1477730e3e790e642242ec4d801180361ff79af85d7d99164e6686823ebb85ee36ccbd612065d5a14d389004c

    • C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe
      Filesize

      795KB

      MD5

      4519de9e3f5efd9400ddfdea287b5daf

      SHA1

      3caede68f0bd9e89b241c73064dd75a29095b422

      SHA256

      6c8b93bdd0153dfe2c4ff9e4c758ec44f3e01fbb77cb54b51e7ed07efa734a44

      SHA512

      656a759aee1b28d470bf32368e4d0372786515a1477730e3e790e642242ec4d801180361ff79af85d7d99164e6686823ebb85ee36ccbd612065d5a14d389004c

    • C:\Users\Admin\AppData\Roaming\ugopoundtek3672.exe
      Filesize

      795KB

      MD5

      4519de9e3f5efd9400ddfdea287b5daf

      SHA1

      3caede68f0bd9e89b241c73064dd75a29095b422

      SHA256

      6c8b93bdd0153dfe2c4ff9e4c758ec44f3e01fbb77cb54b51e7ed07efa734a44

      SHA512

      656a759aee1b28d470bf32368e4d0372786515a1477730e3e790e642242ec4d801180361ff79af85d7d99164e6686823ebb85ee36ccbd612065d5a14d389004c

    • \Users\Admin\AppData\Roaming\ugopoundtek3672.exe
      Filesize

      795KB

      MD5

      4519de9e3f5efd9400ddfdea287b5daf

      SHA1

      3caede68f0bd9e89b241c73064dd75a29095b422

      SHA256

      6c8b93bdd0153dfe2c4ff9e4c758ec44f3e01fbb77cb54b51e7ed07efa734a44

      SHA512

      656a759aee1b28d470bf32368e4d0372786515a1477730e3e790e642242ec4d801180361ff79af85d7d99164e6686823ebb85ee36ccbd612065d5a14d389004c

    • \Users\Admin\AppData\Roaming\ugopoundtek3672.exe
      Filesize

      795KB

      MD5

      4519de9e3f5efd9400ddfdea287b5daf

      SHA1

      3caede68f0bd9e89b241c73064dd75a29095b422

      SHA256

      6c8b93bdd0153dfe2c4ff9e4c758ec44f3e01fbb77cb54b51e7ed07efa734a44

      SHA512

      656a759aee1b28d470bf32368e4d0372786515a1477730e3e790e642242ec4d801180361ff79af85d7d99164e6686823ebb85ee36ccbd612065d5a14d389004c

    • memory/1296-134-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1296-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1788-113-0x0000000004F50000-0x0000000004F90000-memory.dmp
      Filesize

      256KB

    • memory/1788-93-0x0000000004F50000-0x0000000004F90000-memory.dmp
      Filesize

      256KB

    • memory/1788-90-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1788-92-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1788-82-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1788-85-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1788-86-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1788-84-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1788-83-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1788-87-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1820-70-0x0000000000F80000-0x000000000104C000-memory.dmp
      Filesize

      816KB

    • memory/1820-81-0x0000000000CD0000-0x0000000000D02000-memory.dmp
      Filesize

      200KB

    • memory/1820-80-0x0000000005660000-0x000000000570A000-memory.dmp
      Filesize

      680KB

    • memory/1820-79-0x00000000009E0000-0x00000000009EC000-memory.dmp
      Filesize

      48KB

    • memory/1820-77-0x0000000004F20000-0x0000000004F60000-memory.dmp
      Filesize

      256KB

    • memory/1820-76-0x0000000000710000-0x0000000000730000-memory.dmp
      Filesize

      128KB

    • memory/1820-71-0x0000000004F20000-0x0000000004F60000-memory.dmp
      Filesize

      256KB