Analysis

  • max time kernel
    105s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    30/05/2023, 11:41

General

  • Target

    1319f5b076dbd5b75d41c306a762b297.doc

  • Size

    37KB

  • MD5

    1319f5b076dbd5b75d41c306a762b297

  • SHA1

    1682a7ef1fcea059ebf4bb1458038d55f23af836

  • SHA256

    0016ab621d330177ecb0764d435fd311978e35b9c45c1cac8be5b945c478480f

  • SHA512

    d2417225e5e164ef92a6a271bc56058742c245edbd62ea088352ae5509f57d32802870334339728ec11b6a74427063d1af1e4d2fb7b18b8accb02709f900face

  • SSDEEP

    384:nprF3nfkolOCnC3p2MyM1Z5gB8iSwvxjk+tUSut/krY0jiUDhu:px3MoltC3d1Z54xw+txEqD

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\1319f5b076dbd5b75d41c306a762b297.doc"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:864
      • C:\Users\Admin\AppData\Local\Temp\jahah.png
        jahah.png
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:284
        • C:\Users\Admin\AppData\Local\Temp\jahah.png
          "C:\Users\Admin\AppData\Local\Temp\jahah.png"
          3⤵
          • Executes dropped EXE
          PID:1572
        • C:\Users\Admin\AppData\Local\Temp\jahah.png
          "C:\Users\Admin\AppData\Local\Temp\jahah.png"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:1512

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • C:\Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • C:\Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • C:\Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

            Filesize

            20KB

            MD5

            0c3baf88f91afcc18205083dcc38bafe

            SHA1

            cdaf194105595842e3c204541908a9ff7ac34c9d

            SHA256

            940ba2c6767a055475b724c3560813ba16cc0710dd5b9216a773e14c918155ad

            SHA512

            94d5aafd9aa319143f42e659a65baede8b049bd43081d3102563788b2df9684d7a404f46b75c587e8e9154da6c44a399c1cd30e69962090889b6d64e3f191e44

          • \Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • \Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • \Users\Admin\AppData\Local\Temp\jahah.png

            Filesize

            273KB

            MD5

            908da2b3f1932cce84084df7d5ba2218

            SHA1

            5fae534ebc677cd5c424c0b17c45befbfd5adf97

            SHA256

            dcb15efeacf1cfafd9ffb895c4499a749aaba003917d22b9bbaf736f68119a6c

            SHA512

            405eb471570016dcaf397a53d7e86488d0cae5a08ad5f2737303ba4437591ad996e43dee680a4386bb787e9f645ed3e771527589df065c620f7d34b98d9afabf

          • memory/284-68-0x0000000000370000-0x00000000003B6000-memory.dmp

            Filesize

            280KB

          • memory/284-69-0x0000000000670000-0x000000000067A000-memory.dmp

            Filesize

            40KB

          • memory/284-67-0x0000000000320000-0x000000000036A000-memory.dmp

            Filesize

            296KB

          • memory/1168-122-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1168-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1168-59-0x0000000000580000-0x0000000000680000-memory.dmp

            Filesize

            1024KB

          • memory/1168-58-0x0000000000580000-0x0000000000680000-memory.dmp

            Filesize

            1024KB

          • memory/1512-73-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1512-77-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1512-76-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1512-82-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1512-80-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1512-84-0x0000000004D60000-0x0000000004DA0000-memory.dmp

            Filesize

            256KB

          • memory/1512-75-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1512-107-0x0000000004D60000-0x0000000004DA0000-memory.dmp

            Filesize

            256KB

          • memory/1512-74-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/1512-72-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB