Analysis

  • max time kernel
    143s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    16/06/2023, 13:47

General

  • Target

    PO207790.xls

  • Size

    1.7MB

  • MD5

    b12ed68cdbac917994444b5d30d84043

  • SHA1

    137fb253ae433cabddfebba9c9e541cc49b8f8ce

  • SHA256

    c81a1afc4f9e8588907d1cdb78b0bb50ab10a5a4cffe2022ad8dfa1e749a6ca2

  • SHA512

    65bf6400a84ac4b1d00db8e3e2234057c0f0eed33eb9c30ffec60cdd6d820f781a5a7eef42b44d7e5bb15bc7be2d77514437ede64e463ac0660021d660f6e888

  • SSDEEP

    24576:Eu9VDt6IE3ziabzu9VSt6IE3ziabUnaWsyVZWgSPqkZjl1F:EuLt6Iza3uKt6IzaGs6NSS0Z

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO207790.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1732
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Users\Public\clean_cache.exe
      "C:\Users\Public\clean_cache.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Public\clean_cache.exe
        "C:\Users\Public\clean_cache.exe"
        3⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:600

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3D11A973.emf

          Filesize

          3.0MB

          MD5

          c72f77c0ed9e048dfc18c0cb624f7ee0

          SHA1

          b714b9ee99e0eb2423c555e33a67b1698b121545

          SHA256

          e91c1ff3ad612ebceed5c0ac866e1e3884cb2b06eea29fdc9ba3306463265374

          SHA512

          ffed719d98491698ec3917650c20ddc73b53bd811ee69e7f4232d7413928a164f20b90ad2edbb4d080b9fc16d643a87873afd7f696504691ad31d92e84dc5447

        • C:\Users\Admin\AppData\Local\Temp\nso2A10.tmp\krlpzvgdsi.dll

          Filesize

          41KB

          MD5

          feb93ba01251de9b6fc01cad8611e8ae

          SHA1

          6890812202b648aa17655fe9aebb3755a797c4e1

          SHA256

          787a81156598f44cdb5f6c89d685ccd351ddc2ec9de03391dfdca1a9d885ce5a

          SHA512

          49c5348673403ede3d5c1f7bd6ebca8b275477249a6c337d253da6f3491ab12d9d04a2a56a001ac54f020fb102a76eeea171879f63db24c0a5b0108013bf12ec

        • C:\Users\Public\clean_cache.exe

          Filesize

          282KB

          MD5

          0556da46f62c3da93a0de233dc1d76a9

          SHA1

          5d86abdd5d6fffef88a7babe5a1ee99c8a1fda80

          SHA256

          d0c6d22eaf4cb18b6e2325da654db47a6149451ee9e0cdf9a7d569a5c5e1ebae

          SHA512

          6085c047640d31c98f048f30122bab9998bc77a3935f7246ab64d8bf6bc57754f4c9c3ec01202e60d5438501414ea759deb5e623d5e6c37a6fa3992d426e6655

        • C:\Users\Public\clean_cache.exe

          Filesize

          282KB

          MD5

          0556da46f62c3da93a0de233dc1d76a9

          SHA1

          5d86abdd5d6fffef88a7babe5a1ee99c8a1fda80

          SHA256

          d0c6d22eaf4cb18b6e2325da654db47a6149451ee9e0cdf9a7d569a5c5e1ebae

          SHA512

          6085c047640d31c98f048f30122bab9998bc77a3935f7246ab64d8bf6bc57754f4c9c3ec01202e60d5438501414ea759deb5e623d5e6c37a6fa3992d426e6655

        • C:\Users\Public\clean_cache.exe

          Filesize

          282KB

          MD5

          0556da46f62c3da93a0de233dc1d76a9

          SHA1

          5d86abdd5d6fffef88a7babe5a1ee99c8a1fda80

          SHA256

          d0c6d22eaf4cb18b6e2325da654db47a6149451ee9e0cdf9a7d569a5c5e1ebae

          SHA512

          6085c047640d31c98f048f30122bab9998bc77a3935f7246ab64d8bf6bc57754f4c9c3ec01202e60d5438501414ea759deb5e623d5e6c37a6fa3992d426e6655

        • C:\Users\Public\clean_cache.exe

          Filesize

          282KB

          MD5

          0556da46f62c3da93a0de233dc1d76a9

          SHA1

          5d86abdd5d6fffef88a7babe5a1ee99c8a1fda80

          SHA256

          d0c6d22eaf4cb18b6e2325da654db47a6149451ee9e0cdf9a7d569a5c5e1ebae

          SHA512

          6085c047640d31c98f048f30122bab9998bc77a3935f7246ab64d8bf6bc57754f4c9c3ec01202e60d5438501414ea759deb5e623d5e6c37a6fa3992d426e6655

        • \Users\Admin\AppData\Local\Temp\nso2A10.tmp\krlpzvgdsi.dll

          Filesize

          41KB

          MD5

          feb93ba01251de9b6fc01cad8611e8ae

          SHA1

          6890812202b648aa17655fe9aebb3755a797c4e1

          SHA256

          787a81156598f44cdb5f6c89d685ccd351ddc2ec9de03391dfdca1a9d885ce5a

          SHA512

          49c5348673403ede3d5c1f7bd6ebca8b275477249a6c337d253da6f3491ab12d9d04a2a56a001ac54f020fb102a76eeea171879f63db24c0a5b0108013bf12ec

        • \Users\Public\clean_cache.exe

          Filesize

          282KB

          MD5

          0556da46f62c3da93a0de233dc1d76a9

          SHA1

          5d86abdd5d6fffef88a7babe5a1ee99c8a1fda80

          SHA256

          d0c6d22eaf4cb18b6e2325da654db47a6149451ee9e0cdf9a7d569a5c5e1ebae

          SHA512

          6085c047640d31c98f048f30122bab9998bc77a3935f7246ab64d8bf6bc57754f4c9c3ec01202e60d5438501414ea759deb5e623d5e6c37a6fa3992d426e6655

        • memory/600-79-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/600-83-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/600-84-0x0000000001F30000-0x0000000001F60000-memory.dmp

          Filesize

          192KB

        • memory/600-85-0x0000000000400000-0x0000000000441000-memory.dmp

          Filesize

          260KB

        • memory/600-86-0x0000000004510000-0x0000000004550000-memory.dmp

          Filesize

          256KB

        • memory/1676-78-0x0000000000580000-0x0000000000582000-memory.dmp

          Filesize

          8KB

        • memory/1732-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1732-99-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB