Analysis

  • max time kernel
    102s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2023, 05:51

General

  • Target

    SOA.xls

  • Size

    1.2MB

  • MD5

    e43a488037991de4251dee64bdcce465

  • SHA1

    02ba7aa029b88973e74aca10bd40e2831f1ce715

  • SHA256

    4a2f518f1c7a7b76ae10f3f34efaa5cd7584a16d00e81a7e18f2d2bca8f1e5bd

  • SHA512

    781c9cf1c783593d018f66619ac68eca80933694f2bf8622ad8415d616194d7df493449ae10ab71281845c08d0bbde6128c60e603d65ea6db9773e259481ae10

  • SSDEEP

    24576:fu9V+ltDLwBkCZDLwBkWiat8I22k7czefQNAfNafY1j:fu/w1BtfVBRNA1ag1

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SOA.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1720
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:556
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ApzTLRqOoDqx.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1488
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ApzTLRqOoDqx" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF123.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1744
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2044

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmpF123.tmp

          Filesize

          1KB

          MD5

          ef82ad0a3e32f1945e793461372d8952

          SHA1

          163f40613bdbf6c1a0ddb73903349acb52e3591e

          SHA256

          fa127adfca87e27a136da99b077f5f9fa92e00b5c88a56980e0c2464e7dd893b

          SHA512

          9892decc4cbcaed6a9861c815fe2c9afd6c4c18bc4ca38cba804c360aee9967fe20f12676a394a4bd19d74882651d977acecf7a647cd5ca146252b52ecc90716

        • C:\Users\Public\vbc.exe

          Filesize

          638KB

          MD5

          96068a9ee89ae50fd19e2c9914166db0

          SHA1

          8dc47c392390eeaac2eb3feda43f5a104b990ee4

          SHA256

          028ea05169306fbb55d4243ddba1ab8ef6de4d044dc3b41eb5c4274131388bb1

          SHA512

          267d732b8a6dee60a9563c051b8772f6246be86685829476e40b6149b7491166df0c56c5be8cdf8df273bb4301c1e9d8d830c7deb1f28c25437221408edf6940

        • C:\Users\Public\vbc.exe

          Filesize

          638KB

          MD5

          96068a9ee89ae50fd19e2c9914166db0

          SHA1

          8dc47c392390eeaac2eb3feda43f5a104b990ee4

          SHA256

          028ea05169306fbb55d4243ddba1ab8ef6de4d044dc3b41eb5c4274131388bb1

          SHA512

          267d732b8a6dee60a9563c051b8772f6246be86685829476e40b6149b7491166df0c56c5be8cdf8df273bb4301c1e9d8d830c7deb1f28c25437221408edf6940

        • C:\Users\Public\vbc.exe

          Filesize

          638KB

          MD5

          96068a9ee89ae50fd19e2c9914166db0

          SHA1

          8dc47c392390eeaac2eb3feda43f5a104b990ee4

          SHA256

          028ea05169306fbb55d4243ddba1ab8ef6de4d044dc3b41eb5c4274131388bb1

          SHA512

          267d732b8a6dee60a9563c051b8772f6246be86685829476e40b6149b7491166df0c56c5be8cdf8df273bb4301c1e9d8d830c7deb1f28c25437221408edf6940

        • C:\Users\Public\vbc.exe

          Filesize

          638KB

          MD5

          96068a9ee89ae50fd19e2c9914166db0

          SHA1

          8dc47c392390eeaac2eb3feda43f5a104b990ee4

          SHA256

          028ea05169306fbb55d4243ddba1ab8ef6de4d044dc3b41eb5c4274131388bb1

          SHA512

          267d732b8a6dee60a9563c051b8772f6246be86685829476e40b6149b7491166df0c56c5be8cdf8df273bb4301c1e9d8d830c7deb1f28c25437221408edf6940

        • \Users\Public\vbc.exe

          Filesize

          638KB

          MD5

          96068a9ee89ae50fd19e2c9914166db0

          SHA1

          8dc47c392390eeaac2eb3feda43f5a104b990ee4

          SHA256

          028ea05169306fbb55d4243ddba1ab8ef6de4d044dc3b41eb5c4274131388bb1

          SHA512

          267d732b8a6dee60a9563c051b8772f6246be86685829476e40b6149b7491166df0c56c5be8cdf8df273bb4301c1e9d8d830c7deb1f28c25437221408edf6940

        • memory/1488-96-0x0000000002690000-0x00000000026D0000-memory.dmp

          Filesize

          256KB

        • memory/1488-97-0x0000000002690000-0x00000000026D0000-memory.dmp

          Filesize

          256KB

        • memory/1720-102-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1720-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1776-84-0x00000000010B0000-0x00000000010E2000-memory.dmp

          Filesize

          200KB

        • memory/1776-76-0x0000000005600000-0x000000000566A000-memory.dmp

          Filesize

          424KB

        • memory/1776-75-0x0000000000380000-0x000000000038C000-memory.dmp

          Filesize

          48KB

        • memory/1776-71-0x00000000010E0000-0x0000000001186000-memory.dmp

          Filesize

          664KB

        • memory/1776-72-0x0000000000360000-0x0000000000374000-memory.dmp

          Filesize

          80KB

        • memory/1776-73-0x0000000000440000-0x0000000000480000-memory.dmp

          Filesize

          256KB

        • memory/1776-74-0x0000000000440000-0x0000000000480000-memory.dmp

          Filesize

          256KB

        • memory/2044-87-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2044-90-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2044-89-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2044-95-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2044-93-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2044-88-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2044-86-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/2044-85-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB