Analysis

  • max time kernel
    102s
  • max time network
    104s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2023 07:52

General

  • Target

    Sales confirmation-a13802KA.docx

  • Size

    10KB

  • MD5

    aa17844cf349edcb703a84874bf9b51f

  • SHA1

    9c894354e8aac4c58f111c7405a3f92d93d3da4f

  • SHA256

    e2f7f94897d3c542e882840cd25955f9bf9e1b1507955ee144bdf939adcce73e

  • SHA512

    a3ac31637f009b6a717999a60dcc2c5ff032db791ef5c808654b728a7746f6353f3976ab44cb5bbc97e99e1ac87f57af8433076c23dc4c595d69768bcf2f9424

  • SSDEEP

    192:ScIMmtPGT7G/bIwXOVOtlrV5SEzBC4vNq6sM63kp:SPXuT+xXOVOTbhlqHI

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.strictfacilityservices.com
  • Port:
    587
  • Username:
    accounts@strictfacilityservices.com
  • Password:
    SFS!@#321
  • Email To:
    zamanic62@gmail.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Sales confirmation-a13802KA.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:308
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:884
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JNECrDxSdm.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1480
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JNECrDxSdm" /XML "C:\Users\Admin\AppData\Local\Temp\tmp207D.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:820
        • C:\Users\Public\vbc.exe
          "C:\Users\Public\vbc.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1944

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Scheduled Task

    1
    T1053

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    1
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      f03f8e60df4fb7cea4b0e7cd21de80c5

      SHA1

      cdbcfc93ba094b5b7c6cebc74b71d4977afd6139

      SHA256

      98790ad648b905294e96951c8ee4484b2cd15ee6fa929433518ab6488a3dbf4c

      SHA512

      c6bdcbce2b72dbd77c7aa38e9172f7a7420b2f57057a939dafbf49a3762b147f4278d4a294e332919383aabeaa5da6afae42f399f3b0aa96de2317ca3a9fb1eb

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{599F67BF-866F-4133-8391-0BD8CD8B1C63}.FSD
      Filesize

      128KB

      MD5

      bfa00453d71488890668d0ba6877977b

      SHA1

      b36e12f92a616e0e136a5a303fae65e48cf4dd71

      SHA256

      eb8e3bfa128793d71db558c35e18c1e31728a3d83c1fa60dbe9e81631f4e2c6a

      SHA512

      f2cf8dc0967836d10c58701f06097a1899232a903051aa008f725e41e5991b50084173fca5591e8c5106dd129eb69f76ecf6aae7d8d90ffdd3239e06f84075b8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      0398ecd503f96025330f36613156eac3

      SHA1

      8e4ad2a9f7c97e58de9153729257316ce4cd6152

      SHA256

      51f61014296f844c27d7cf1cc2bd860ba889ec8753aa35af6d30d4f926dd99f9

      SHA512

      f4493a4f5a27d7945d516333330e22077fce68032aef5d6a3598c127d23647207ee1480ef27fd3c6c9b1f18d7fd746ae2dfd79d7da3f9514b73794f50eefdf41

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{0F94E19F-280C-4470-9504-1218E1C37576}.FSD
      Filesize

      128KB

      MD5

      b3625ae8aacbebfdf9d172a65fda8283

      SHA1

      c456deb0a6fd2b8852462342f674c2ab6ca06731

      SHA256

      8d7a6d603a2f761d865d189dc3414bd7599ae8384523ed364abb696efb19e5ed

      SHA512

      38645bd887b0699bb35fff13d8844f5cc5f341c26a2b6fed683bb4742965d29bc97270880975e755e4fd3cf2260e70a11ef988628e63db1696e2e0738ba7bc70

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\QCNSQOTT\######################################[1].doc
      Filesize

      22KB

      MD5

      e585de882debb5a6570a92cd36041dfd

      SHA1

      6fb8c051c8dcd87c380a60a18d81793a8aed4e10

      SHA256

      eadde3baffcc9c4bc8416713367eba8c58b38b271c07f35ac68b1b7f3927965a

      SHA512

      e2eb8afd4c889f6b5c97620629483b02970d8d365bb319acfe36970e7f6c28b80c263a76a3c7444e6c1a6fb24ad089c76261ffba940a647148c53ddaae77e713

    • C:\Users\Admin\AppData\Local\Temp\tmp207D.tmp
      Filesize

      1KB

      MD5

      2cbc9c74e81e05462b3eafbbba4c1720

      SHA1

      0cb2ca5a1d2acbd9c3ca35532fa3cd42b8d1cf3d

      SHA256

      19c7da2a76e023f61fb44c1f654b3a43be59a7ececabb08484ee1a49bd3a69c1

      SHA512

      277c860d88bd675040ab6dd034d5a525b317f1b65add53a88bffdeba1ed0f27219fb230442195ada9a81ab0297a3b6289fd6b4962ed6312ee1fc458a5ab84005

    • C:\Users\Admin\AppData\Local\Temp\{438CDF26-6882-4A29-BEFB-A58F9A411042}
      Filesize

      128KB

      MD5

      6e5285513a37df1024f12d129786a042

      SHA1

      f59c4058f7e6bb42edc592e0fa7bab03c06f9b3f

      SHA256

      75628ffa06adaee37e9c755c5c0617cd51f3d68c0f04ccc30b62d16e153eaa8f

      SHA512

      9b8cce65cf330a0fd703a52e2e85b12657a623a77fde2ed93ac245f5b4c5d25f0b542235fa0974bcb5cb05ad93e612b0dab119a4733d068594d5c0fb7b1fd5cb

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      2efb5ba9c6da4e444d865106e9f76ae1

      SHA1

      923649ecec0078ee53755d9bfc87890c3ed9009b

      SHA256

      080bdac3a9caec5cc80409d675cc2c827fd46014b391d111f63f370ba792ea1f

      SHA512

      821ed45686e1c791c8f19a9e6435f7ed395dea644dc74f1b6d4c14229d79132b15ec1e85c815aff58b9c4831116fbc6a06bb8de57fc9ced24a683991579b2444

    • C:\Users\Public\vbc.exe
      Filesize

      587KB

      MD5

      2695bbee65577ccc58e90a792688bd57

      SHA1

      06cfe3a6cf0ef40585131091295c027cb9cba1e6

      SHA256

      da2672a63dddcb9bf226ce99f0b096bd65875ae950b4b0d481e2dc02b6b9a260

      SHA512

      4ec641191b3564002814c56cdbcd833cbbb6e9bc7497c67f2c1b1fc8f9fa2df3ff6b740cf47525a69cea67b9af10f3b164e3c3d537669f30d318e8c775bf3acc

    • C:\Users\Public\vbc.exe
      Filesize

      587KB

      MD5

      2695bbee65577ccc58e90a792688bd57

      SHA1

      06cfe3a6cf0ef40585131091295c027cb9cba1e6

      SHA256

      da2672a63dddcb9bf226ce99f0b096bd65875ae950b4b0d481e2dc02b6b9a260

      SHA512

      4ec641191b3564002814c56cdbcd833cbbb6e9bc7497c67f2c1b1fc8f9fa2df3ff6b740cf47525a69cea67b9af10f3b164e3c3d537669f30d318e8c775bf3acc

    • C:\Users\Public\vbc.exe
      Filesize

      587KB

      MD5

      2695bbee65577ccc58e90a792688bd57

      SHA1

      06cfe3a6cf0ef40585131091295c027cb9cba1e6

      SHA256

      da2672a63dddcb9bf226ce99f0b096bd65875ae950b4b0d481e2dc02b6b9a260

      SHA512

      4ec641191b3564002814c56cdbcd833cbbb6e9bc7497c67f2c1b1fc8f9fa2df3ff6b740cf47525a69cea67b9af10f3b164e3c3d537669f30d318e8c775bf3acc

    • C:\Users\Public\vbc.exe
      Filesize

      587KB

      MD5

      2695bbee65577ccc58e90a792688bd57

      SHA1

      06cfe3a6cf0ef40585131091295c027cb9cba1e6

      SHA256

      da2672a63dddcb9bf226ce99f0b096bd65875ae950b4b0d481e2dc02b6b9a260

      SHA512

      4ec641191b3564002814c56cdbcd833cbbb6e9bc7497c67f2c1b1fc8f9fa2df3ff6b740cf47525a69cea67b9af10f3b164e3c3d537669f30d318e8c775bf3acc

    • \Users\Public\vbc.exe
      Filesize

      587KB

      MD5

      2695bbee65577ccc58e90a792688bd57

      SHA1

      06cfe3a6cf0ef40585131091295c027cb9cba1e6

      SHA256

      da2672a63dddcb9bf226ce99f0b096bd65875ae950b4b0d481e2dc02b6b9a260

      SHA512

      4ec641191b3564002814c56cdbcd833cbbb6e9bc7497c67f2c1b1fc8f9fa2df3ff6b740cf47525a69cea67b9af10f3b164e3c3d537669f30d318e8c775bf3acc

    • memory/884-152-0x0000000005620000-0x000000000568A000-memory.dmp
      Filesize

      424KB

    • memory/884-142-0x0000000004D70000-0x0000000004DB0000-memory.dmp
      Filesize

      256KB

    • memory/884-151-0x0000000000410000-0x000000000041C000-memory.dmp
      Filesize

      48KB

    • memory/884-143-0x0000000000400000-0x0000000000414000-memory.dmp
      Filesize

      80KB

    • memory/884-160-0x00000000021F0000-0x0000000002222000-memory.dmp
      Filesize

      200KB

    • memory/884-150-0x0000000004D70000-0x0000000004DB0000-memory.dmp
      Filesize

      256KB

    • memory/884-141-0x0000000000D40000-0x0000000000DDA000-memory.dmp
      Filesize

      616KB

    • memory/1480-174-0x0000000002570000-0x00000000025B0000-memory.dmp
      Filesize

      256KB

    • memory/1480-173-0x0000000002570000-0x00000000025B0000-memory.dmp
      Filesize

      256KB

    • memory/1676-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1676-202-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1944-161-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1944-166-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1944-169-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1944-171-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1944-172-0x0000000000CE0000-0x0000000000D20000-memory.dmp
      Filesize

      256KB

    • memory/1944-164-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1944-165-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1944-175-0x0000000000CE0000-0x0000000000D20000-memory.dmp
      Filesize

      256KB

    • memory/1944-162-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB

    • memory/1944-163-0x0000000000400000-0x0000000000430000-memory.dmp
      Filesize

      192KB