Analysis

  • max time kernel
    149s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2023 10:13

General

  • Target

    Order 274791085.docx

  • Size

    10KB

  • MD5

    194e686634e2515c423cb0cd5f9c981a

  • SHA1

    b792d00fecc27915c2a28490be4ff2e8228583e1

  • SHA256

    0a8e2816b7403cd8f517b41571ad43bb532badb8638f088cadd66dfc7c1e81b9

  • SHA512

    99067893db72452ff46b2fb195497427923dee9c020a6137ed178c75c0a3a98bb06e25b2a8bf509b539722dc46302a8b9590a89390225410290175e4fa5f7ed8

  • SSDEEP

    192:ScIMmtPGT7G/bIwXOVOku5SEzBC4vNq6sM63qR:SPXuT+xXOVOZhlqH+

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order 274791085.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:948
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:772
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1520
        • C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
          "C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe" C:\Users\Admin\AppData\Local\Temp\dycbhq.amb
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:548
          • C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
            "C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1016

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B466500B-4741-4DBA-A6A1-7CBE80E99252}.FSD
      Filesize

      128KB

      MD5

      a408fcdb0c1ff81ed3b305f327209a53

      SHA1

      f3a229a4b27ed74e94f7d2f501c4f89064e46e58

      SHA256

      feb63f03770bdb0ac43e96b122311d5fbc28ce43f827133bb288f3fc360b2ba5

      SHA512

      f9beaf8eda4bfb42528d770fbbce3f4bb6f6ca5e5fca12437ceb294f30aa2716306d249c2b4bb9ccee96fa84918b1dc076b9a00fc44852980027d6c1b2f75ab2

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{B1B404A7-AD1C-46BF-8296-B1E101CF0673}.FSD
      Filesize

      128KB

      MD5

      4a142c2e9d5e32412d15d78a4e5f6a2f

      SHA1

      0eafa3f080ad5d7e41ddefdef8d0344c3723ee26

      SHA256

      b9d08a134b8e4da389d2aaff142c8932be1d87cd83fd5e96db127674e92a2829

      SHA512

      1a7f3b476ab98a65c74a3afa0e577e85f21afec7e5d080df76c8c7e386a394a412b428953ff2173dbca41395988f24165a24f8ff64522e30bc0e60381da10d6f

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\TOS3MI7U\##############################[1].doc
      Filesize

      28KB

      MD5

      533f738ac129a1b829a11c860fa4908e

      SHA1

      8e77016f1fbcde6919c134315b4c056e62ca989c

      SHA256

      e59bcb9e5e2c71c4cb90b0b591d3588215a2aeeb12d1aed39fcf0552ed1574b5

      SHA512

      6294e673916f94a28f1be4586fdc9f0876c3696851649999ccefa3d47dd84a70aa0206f5479901adbdde16b32b71caffc6f1e5518003e7461aa670ddcfdd69ea

    • C:\Users\Admin\AppData\Local\Temp\avnmxsbwm.v
      Filesize

      264KB

      MD5

      2e10d56d6bb423e3299caf3ec262b56a

      SHA1

      cae94328f7ae06cfe325e75838d6929dd465c33c

      SHA256

      eea89eb51875c0e96a26975ae1948d531c93a1bee21e9a3ecbc1e785cf09fb8c

      SHA512

      83cfdc91c9d6fb03c7d6101d13092d208f918f62383ebdcf81548f5288c35c9dbe1038ebf16420200d7c1f7878062a40b57a10256fdce66d89b659f7018e54cf

    • C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
      Filesize

      323KB

      MD5

      9dddb1befc9b63097b0348e7a6d20e83

      SHA1

      1df5345580b1a99ecec45a195143fe7ed5ed87ca

      SHA256

      97bc4f746b5c536e7cfe6f180f5a260d441eeea798b624d8beb1e8add3e13a96

      SHA512

      c8fbca4fc543e59286d57418ca40dc5fffd1db00d3a60096f4be3cbb7738089a6bc033b53099a9df24032e0418a46fe48d8304bc975835523c2f9ed31e1e9912

    • C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
      Filesize

      323KB

      MD5

      9dddb1befc9b63097b0348e7a6d20e83

      SHA1

      1df5345580b1a99ecec45a195143fe7ed5ed87ca

      SHA256

      97bc4f746b5c536e7cfe6f180f5a260d441eeea798b624d8beb1e8add3e13a96

      SHA512

      c8fbca4fc543e59286d57418ca40dc5fffd1db00d3a60096f4be3cbb7738089a6bc033b53099a9df24032e0418a46fe48d8304bc975835523c2f9ed31e1e9912

    • C:\Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
      Filesize

      323KB

      MD5

      9dddb1befc9b63097b0348e7a6d20e83

      SHA1

      1df5345580b1a99ecec45a195143fe7ed5ed87ca

      SHA256

      97bc4f746b5c536e7cfe6f180f5a260d441eeea798b624d8beb1e8add3e13a96

      SHA512

      c8fbca4fc543e59286d57418ca40dc5fffd1db00d3a60096f4be3cbb7738089a6bc033b53099a9df24032e0418a46fe48d8304bc975835523c2f9ed31e1e9912

    • C:\Users\Admin\AppData\Local\Temp\dycbhq.amb
      Filesize

      8KB

      MD5

      af50365f753838b41fb0cab5d05de242

      SHA1

      a2681388f0f5cdadf636bc829063feaa61cc802e

      SHA256

      358804a14ac8580fca713f02f814f79a2f7e14e4a304452aa4f6cb5ab0f4fdad

      SHA512

      a6bb9f30579e879512c8617b64e124db7feb74d0346df5eca791317382cd27f044a1b24c3eff09aca61232741751cda1428513dcf882690c7e0e6604d52583bf

    • C:\Users\Admin\AppData\Local\Temp\{361F7787-8786-4CA6-ADC2-281D7FAD2362}
      Filesize

      128KB

      MD5

      c8924510e87b11430e4349f0bfb8d217

      SHA1

      8448c10fdddabd5089681071cc2cd79e87a41921

      SHA256

      b96f0f8d72fe7e14bec91a185cc0a34556bf0faf7c0bf8ec87af7c9a31be4660

      SHA512

      cecfac4315e58bece607391c4889a5eb7d3699175e70c9cb2158842ab0e8b8a87450e19d0ea0cc7cd2b9b077c30fd5873d28b1d7c8b8ee0c55145654bd3b6fda

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      b8ee29ac33855d45796140b0b131b7b7

      SHA1

      eedd9a588125c1dd512056f6ff57a842919ffe2d

      SHA256

      1fb3988a2ab01c6f2101969cac8f1429cbd0c2237e0aea693b67cf9aed198bb3

      SHA512

      0e8d0dd3e3e68674e503b62bf1cc307e4d15826abc2fb2ad4779c7db96d50e7dabfcfe49e5d5bcfa8f3f30195d876fef68c3baaa35796ae1a13ad5ccf13b659d

    • C:\Users\Public\vbc.exe
      Filesize

      394KB

      MD5

      8ac8e102ef0aeaebbd409103f9237c2f

      SHA1

      f4f167dd5a9453c5da024de5a58a78fa70bbb14d

      SHA256

      d44ee4f9fdee764e54c2155948efde9f969b515d4ddc740e6cb192d7d8328dac

      SHA512

      3bc1242a9cca06490c12678c92b9f7a758ce69601ad191c448a9946d6fdae90e8f43ef0b68a4b28dace38dd93b03ae7bdacacc65f738b1c5ede61774212946db

    • C:\Users\Public\vbc.exe
      Filesize

      394KB

      MD5

      8ac8e102ef0aeaebbd409103f9237c2f

      SHA1

      f4f167dd5a9453c5da024de5a58a78fa70bbb14d

      SHA256

      d44ee4f9fdee764e54c2155948efde9f969b515d4ddc740e6cb192d7d8328dac

      SHA512

      3bc1242a9cca06490c12678c92b9f7a758ce69601ad191c448a9946d6fdae90e8f43ef0b68a4b28dace38dd93b03ae7bdacacc65f738b1c5ede61774212946db

    • C:\Users\Public\vbc.exe
      Filesize

      394KB

      MD5

      8ac8e102ef0aeaebbd409103f9237c2f

      SHA1

      f4f167dd5a9453c5da024de5a58a78fa70bbb14d

      SHA256

      d44ee4f9fdee764e54c2155948efde9f969b515d4ddc740e6cb192d7d8328dac

      SHA512

      3bc1242a9cca06490c12678c92b9f7a758ce69601ad191c448a9946d6fdae90e8f43ef0b68a4b28dace38dd93b03ae7bdacacc65f738b1c5ede61774212946db

    • \Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
      Filesize

      323KB

      MD5

      9dddb1befc9b63097b0348e7a6d20e83

      SHA1

      1df5345580b1a99ecec45a195143fe7ed5ed87ca

      SHA256

      97bc4f746b5c536e7cfe6f180f5a260d441eeea798b624d8beb1e8add3e13a96

      SHA512

      c8fbca4fc543e59286d57418ca40dc5fffd1db00d3a60096f4be3cbb7738089a6bc033b53099a9df24032e0418a46fe48d8304bc975835523c2f9ed31e1e9912

    • \Users\Admin\AppData\Local\Temp\coabkgfaqv.exe
      Filesize

      323KB

      MD5

      9dddb1befc9b63097b0348e7a6d20e83

      SHA1

      1df5345580b1a99ecec45a195143fe7ed5ed87ca

      SHA256

      97bc4f746b5c536e7cfe6f180f5a260d441eeea798b624d8beb1e8add3e13a96

      SHA512

      c8fbca4fc543e59286d57418ca40dc5fffd1db00d3a60096f4be3cbb7738089a6bc033b53099a9df24032e0418a46fe48d8304bc975835523c2f9ed31e1e9912

    • \Users\Public\vbc.exe
      Filesize

      394KB

      MD5

      8ac8e102ef0aeaebbd409103f9237c2f

      SHA1

      f4f167dd5a9453c5da024de5a58a78fa70bbb14d

      SHA256

      d44ee4f9fdee764e54c2155948efde9f969b515d4ddc740e6cb192d7d8328dac

      SHA512

      3bc1242a9cca06490c12678c92b9f7a758ce69601ad191c448a9946d6fdae90e8f43ef0b68a4b28dace38dd93b03ae7bdacacc65f738b1c5ede61774212946db

    • memory/548-150-0x0000000000260000-0x0000000000263000-memory.dmp
      Filesize

      12KB

    • memory/948-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/948-219-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1016-155-0x0000000000400000-0x0000000000441000-memory.dmp
      Filesize

      260KB

    • memory/1016-158-0x0000000000400000-0x0000000000441000-memory.dmp
      Filesize

      260KB

    • memory/1016-160-0x00000000003D0000-0x0000000000400000-memory.dmp
      Filesize

      192KB

    • memory/1016-161-0x0000000000400000-0x0000000000441000-memory.dmp
      Filesize

      260KB

    • memory/1016-162-0x0000000004550000-0x0000000004590000-memory.dmp
      Filesize

      256KB