Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    20-04-2023 07:51

General

  • Target

    Overdue Statement of Account_1.docx

  • Size

    10KB

  • MD5

    397c47ede0b01a7145478c1c1ebfecad

  • SHA1

    2f8398ddc426bcbaac364e6339b77b8e807c8fa4

  • SHA256

    c14068b312c53040f23e40aca6a6251d2330b1ec6874061b50ebb7e6800fda29

  • SHA512

    7eed78e77302ca07dca6926bf1deb2a0c0630d749811a1fc3d45e19aefb88b0ccb953a3e3782cb43901dc72bda73e8b5e9dd466a2421d5a16c6fb08a51bd94af

  • SSDEEP

    192:ScIMmtPGT7G/bIwXOVORtKz5SEzBC4vNq6sM63SR:SPXuT+xXOVOSdhlqH2

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Overdue Statement of Account_1.docx"
    1⤵
    • Abuses OpenXML format to download file from external location
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:868
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1268
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
          "C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe" C:\Users\Admin\AppData\Local\Temp\szvmsm.l
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:1532
          • C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
            "C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1496

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Exploitation for Client Execution

    1
    T1203

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Scripting

    1
    T1064

    Modify Registry

    2
    T1112

    Credential Access

    Credentials in Files

    3
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    3
    T1005

    Email Collection

    1
    T1114

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{38BDF1A0-344F-4FC0-86E4-B3AD28DED0E6}.FSD
      Filesize

      128KB

      MD5

      1e73098a32e0097c8f87f18c62c02f93

      SHA1

      d96fe0f074ae1892f1de83589fa4d8d0f9766fb5

      SHA256

      5f5cf59becd3f270c66b48b696cf5af2fa4e5bfc93c26a59334f6a6a3edd0d9d

      SHA512

      e573811e4a3491668c78d56a655c75752ae7d07500438a7536478a266485ac39bff6b85debe03fb4a3134342b85e23840a608a887de706b31b9583199c680ec7

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      407e2481745ff99e5ed574380f7a6459

      SHA1

      f7a9934c54338b073f5fd6ff3200dcbb197e1a7c

      SHA256

      d3c9427dd905f4262656fa9886c274fa611b3ddb1d2ae40b540cce9efd90c3d2

      SHA512

      3471e256f2cef6d0d145cb8e73b3249dcc5034e874005368c46e673d2a9ba778921cf57d03dfb9fc600f5766f1318ee3a5c3ef0fbf093f9763d9e08149368553

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{8AEDA2C6-BA48-49EA-BFED-F27F238336AF}.FSD
      Filesize

      128KB

      MD5

      a69e90d5428c853d6eab11ea4daddbb5

      SHA1

      187b215868a00fc7e7633bffc7abbe11e55fed6e

      SHA256

      4dc30778272816de9db989f776f05ef58e4f7296ab0d49fdfe05f1c8d22757fa

      SHA512

      3e156a60463a6e20552d71f32e521c407c429f478bfac04fa1a76e949cd8cc2bd2f9aa7a0b4aff62b23a64c5ffdc8a814958f0a4583832edd169c74f02353fac

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EV74ZOZO\###################################[1].doc
      Filesize

      28KB

      MD5

      0817ef065eab1d86f70a24c0100a62e2

      SHA1

      382996b5049aa9dc672795d8dfa765697b1c852f

      SHA256

      0148aaa1bc49312cada5408720ed9f547044dbed42cac01f0fea834bda8b5eac

      SHA512

      62fdb904ff724b73fa1a16d21f29b89092f04b6189ee59e76860709d9aaf7ffae4ef1e0e381ccd17815377b2bcd8d155e560f74791c36f2b9386b20b3261b25d

    • C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
      Filesize

      87KB

      MD5

      22d7f566b02de8e7b8a83e39964ca949

      SHA1

      e9a92597cdb3ca0882da5de1d4cf7606ef11152b

      SHA256

      5dbbc8f2783b027318c33222847342819583626c8567e77f015c1ccbf23bbdb4

      SHA512

      a090250d72446751135ae8ad7919e1f42c610344540cdfa139c9b35a2d38ebaf6b2b01b8c386a54639aba6fd1a7657ee9f111dbb822a3ce9415172cf51cad2f8

    • C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
      Filesize

      87KB

      MD5

      22d7f566b02de8e7b8a83e39964ca949

      SHA1

      e9a92597cdb3ca0882da5de1d4cf7606ef11152b

      SHA256

      5dbbc8f2783b027318c33222847342819583626c8567e77f015c1ccbf23bbdb4

      SHA512

      a090250d72446751135ae8ad7919e1f42c610344540cdfa139c9b35a2d38ebaf6b2b01b8c386a54639aba6fd1a7657ee9f111dbb822a3ce9415172cf51cad2f8

    • C:\Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
      Filesize

      87KB

      MD5

      22d7f566b02de8e7b8a83e39964ca949

      SHA1

      e9a92597cdb3ca0882da5de1d4cf7606ef11152b

      SHA256

      5dbbc8f2783b027318c33222847342819583626c8567e77f015c1ccbf23bbdb4

      SHA512

      a090250d72446751135ae8ad7919e1f42c610344540cdfa139c9b35a2d38ebaf6b2b01b8c386a54639aba6fd1a7657ee9f111dbb822a3ce9415172cf51cad2f8

    • C:\Users\Admin\AppData\Local\Temp\kdxioiyj.wj
      Filesize

      263KB

      MD5

      69676c152b9d72d706a62d0af91b987d

      SHA1

      fa6f22c8a4f5b79eb21c264307f5c27935d18da4

      SHA256

      ff55faa58e8b8a72ae324674643115ac94b7332f584da357f836b607e184a136

      SHA512

      767fe6c8d65d7ee37836dd4b67e91c4d9a334537e003e1b0ee56d8927214cb10841b506564284e6a4056d5704028e95ff95d42a2b5ba3af5dd2a32e9ac0fe9da

    • C:\Users\Admin\AppData\Local\Temp\szvmsm.l
      Filesize

      7KB

      MD5

      45993e1d0ecad606c24bf9169455611b

      SHA1

      7710e7d90ae346a13d0c67aab4c50b9e60026656

      SHA256

      2bc5aa1a124836de79680477dbb404cd4a604cc6cad9d9871930c2c2efd7a8e8

      SHA512

      b63ec0393c4a11945ea8f9a430ba42fca111c1be7edc2c2a5233a7e1440296a2bc963fbba6345d1190d635fdeb92df279fb1f2e78563a5e4269088c4e09d86e0

    • C:\Users\Admin\AppData\Local\Temp\{DBA12EAC-02F9-4E24-982C-28B7EC310482}
      Filesize

      128KB

      MD5

      d0d56a3fa90f29f0c16ff42f5666ac99

      SHA1

      7915da6b2bab6140d5b0468e24c9c1be6d4dd10f

      SHA256

      33a911b5b946e73a4ef31329366b7280e8aafb3d9661bb815ee42dcf706f289b

      SHA512

      817831d7f56a4547612edb19271403c803d6996f672bbe01765ee7b6ada00c35b13ca76d05f280c95f1fa90671215af2b3773155cdcb88fa6d980733e55f11c2

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      8411ca662f4b8fdafa17983aa7b6c844

      SHA1

      8f1340aee72450782d7fee2b9e33da71b668c0d4

      SHA256

      a9414ec3c47913da0e179b9da1aad7f2bdaeac30c42dd80082dd8e8db7495ccc

      SHA512

      8ea2f3066d3dd86162e57cf2d6b3177d061237b5361f35faf5c01c5b76ddf434c6c1fc26b8b1f0a5d028578c3ff02ebd3121790f75cd23789c84cbef7d500fc1

    • C:\Users\Public\vbc.exe
      Filesize

      305KB

      MD5

      fd4d349554b93a53a3d5540a92f251c0

      SHA1

      a1b582b262d0088ebd284686d85ef5e5a7a14823

      SHA256

      36b0fbab2618611a165f399650cd3581a3a0723687164cd8482be37957ac4f35

      SHA512

      415e5513532dadfb82ff5968009874269387d37307f8b2828dfc0399607d9cbe33a1186bd8a59f976b0eb515e83581a702233f4cc6e70984b6844c24b759d9e7

    • C:\Users\Public\vbc.exe
      Filesize

      305KB

      MD5

      fd4d349554b93a53a3d5540a92f251c0

      SHA1

      a1b582b262d0088ebd284686d85ef5e5a7a14823

      SHA256

      36b0fbab2618611a165f399650cd3581a3a0723687164cd8482be37957ac4f35

      SHA512

      415e5513532dadfb82ff5968009874269387d37307f8b2828dfc0399607d9cbe33a1186bd8a59f976b0eb515e83581a702233f4cc6e70984b6844c24b759d9e7

    • C:\Users\Public\vbc.exe
      Filesize

      305KB

      MD5

      fd4d349554b93a53a3d5540a92f251c0

      SHA1

      a1b582b262d0088ebd284686d85ef5e5a7a14823

      SHA256

      36b0fbab2618611a165f399650cd3581a3a0723687164cd8482be37957ac4f35

      SHA512

      415e5513532dadfb82ff5968009874269387d37307f8b2828dfc0399607d9cbe33a1186bd8a59f976b0eb515e83581a702233f4cc6e70984b6844c24b759d9e7

    • \Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
      Filesize

      87KB

      MD5

      22d7f566b02de8e7b8a83e39964ca949

      SHA1

      e9a92597cdb3ca0882da5de1d4cf7606ef11152b

      SHA256

      5dbbc8f2783b027318c33222847342819583626c8567e77f015c1ccbf23bbdb4

      SHA512

      a090250d72446751135ae8ad7919e1f42c610344540cdfa139c9b35a2d38ebaf6b2b01b8c386a54639aba6fd1a7657ee9f111dbb822a3ce9415172cf51cad2f8

    • \Users\Admin\AppData\Local\Temp\ihznenbjwa.exe
      Filesize

      87KB

      MD5

      22d7f566b02de8e7b8a83e39964ca949

      SHA1

      e9a92597cdb3ca0882da5de1d4cf7606ef11152b

      SHA256

      5dbbc8f2783b027318c33222847342819583626c8567e77f015c1ccbf23bbdb4

      SHA512

      a090250d72446751135ae8ad7919e1f42c610344540cdfa139c9b35a2d38ebaf6b2b01b8c386a54639aba6fd1a7657ee9f111dbb822a3ce9415172cf51cad2f8

    • \Users\Public\vbc.exe
      Filesize

      305KB

      MD5

      fd4d349554b93a53a3d5540a92f251c0

      SHA1

      a1b582b262d0088ebd284686d85ef5e5a7a14823

      SHA256

      36b0fbab2618611a165f399650cd3581a3a0723687164cd8482be37957ac4f35

      SHA512

      415e5513532dadfb82ff5968009874269387d37307f8b2828dfc0399607d9cbe33a1186bd8a59f976b0eb515e83581a702233f4cc6e70984b6844c24b759d9e7

    • memory/1240-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1240-218-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1496-157-0x0000000000400000-0x0000000000441000-memory.dmp
      Filesize

      260KB

    • memory/1496-161-0x0000000000840000-0x0000000000870000-memory.dmp
      Filesize

      192KB

    • memory/1496-162-0x0000000004710000-0x0000000004750000-memory.dmp
      Filesize

      256KB

    • memory/1496-163-0x0000000004710000-0x0000000004750000-memory.dmp
      Filesize

      256KB

    • memory/1496-186-0x0000000004710000-0x0000000004750000-memory.dmp
      Filesize

      256KB

    • memory/1496-159-0x0000000000400000-0x0000000000441000-memory.dmp
      Filesize

      260KB

    • memory/1496-154-0x0000000000400000-0x0000000000441000-memory.dmp
      Filesize

      260KB