Analysis
-
max time kernel
120s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21-07-2023 04:18
Static task
static1
Behavioral task
behavioral1
Sample
KSY Product Catalog.rtf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
KSY Product Catalog.rtf
Resource
win10v2004-20230703-en
General
-
Target
KSY Product Catalog.rtf
-
Size
39KB
-
MD5
cc47323a812b42250d34573c4b9f12e0
-
SHA1
2af65a3a53f0a39fe33c17aa43698c2d1a0bee61
-
SHA256
1646017b8052c3ea33881beeb6c7e7755567eaa49c4eb2df8e7d89496af01f7d
-
SHA512
ddb75c8b423ea343d6694ccee5e517a9936f3a93cff3c504e482f376c5925b1af1994d43feeb65bbfab7c78a2e9420c8f2d301fd6f2fe777a14f65b49a5ae4e4
-
SSDEEP
768:oFx0XaIsnPRIa4fwJMrhv97Lxub+x034EWa+fBV8kH:of0Xvx3EM19HxubBfWRBykH
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2340 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2388 yugokanf696178.exe 1100 yugokanf696178.exe -
Loads dropped DLL 1 IoCs
pid Process 2340 EQNEDT32.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yugokanf696178.exe Key opened \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yugokanf696178.exe Key opened \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yugokanf696178.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2388 set thread context of 1100 2388 yugokanf696178.exe 35 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2340 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2556 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1100 yugokanf696178.exe 1100 yugokanf696178.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1100 yugokanf696178.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2556 WINWORD.EXE 2556 WINWORD.EXE 1100 yugokanf696178.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2388 2340 EQNEDT32.EXE 29 PID 2340 wrote to memory of 2388 2340 EQNEDT32.EXE 29 PID 2340 wrote to memory of 2388 2340 EQNEDT32.EXE 29 PID 2340 wrote to memory of 2388 2340 EQNEDT32.EXE 29 PID 2556 wrote to memory of 2728 2556 WINWORD.EXE 34 PID 2556 wrote to memory of 2728 2556 WINWORD.EXE 34 PID 2556 wrote to memory of 2728 2556 WINWORD.EXE 34 PID 2556 wrote to memory of 2728 2556 WINWORD.EXE 34 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 PID 2388 wrote to memory of 1100 2388 yugokanf696178.exe 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yugokanf696178.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2969888527-3102471180-2307688834-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 yugokanf696178.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\KSY Product Catalog.rtf"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2728
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\yugokanf696178.exe"C:\Users\Admin\AppData\Roaming\yugokanf696178.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\yugokanf696178.exe"C:\Users\Admin\AppData\Roaming\yugokanf696178.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD53ac860860707baaf32469fa7cc7c0192
SHA1c33c2acdaba0e6fa41fd2f00f186804722477639
SHA256d015145d551ecd14916270efad773bbc9fd57fad2228d2c24559f696c961d904
SHA512d62ad2408c969a95550fb87efda50f988770ba5e39972041bf85924275baf156b8bec309ecc6409e5acdd37ec175dea40eff921ab58933b5b5b5d35a6147567c
-
Filesize
164KB
MD54ff65ad929cd9a367680e0e5b1c08166
SHA1c0af0d4396bd1f15c45f39d3b849ba444233b3a2
SHA256c8733c93cc5aaf5ca206d06af22ee8dbdec764fb5085019a6a9181feb9dfdee6
SHA512f530dc0d024a5a3b8903ffaaa41b608a5ccdd6da4ba1949f2c2e55a9fca475fec5c8d2119b5763cabe7ef1c3788fb9dcac621869db51d65b1d83cfe404fb4c27
-
Filesize
20KB
MD526a2c690afb1713284cde5efb7981b0b
SHA135d173b008f9029b7c416a7cc607381067c3589f
SHA2567536a178157f38becc7c8703eade129da1b9dd6d02c6bd47408403686d0503ca
SHA51220fa70502114635a8b5228a6936bb66584bf56be316acaf57ee7669756a579ba56a227d3014cb1f52425de6d97d3f79e726060f65ee9f8d04009c41dbd6d035a
-
Filesize
633KB
MD5764cb439deb85a06073c46f475956fc4
SHA1cfd265f85f54b84b0ce27d9d3a68fef3d6974b49
SHA2569db20870570e93875292e6a6a5f7683982cbe675135032c7dafc2b9704f3cb06
SHA512109976d83b59dbf1045cf6ce0d4c813424e97318b66a56495858f2814d1f61a18cce4a996fae0d7b2f49af6b6e9e0dc12b139724dbaad07ac9904b6d4910cf02
-
Filesize
633KB
MD5764cb439deb85a06073c46f475956fc4
SHA1cfd265f85f54b84b0ce27d9d3a68fef3d6974b49
SHA2569db20870570e93875292e6a6a5f7683982cbe675135032c7dafc2b9704f3cb06
SHA512109976d83b59dbf1045cf6ce0d4c813424e97318b66a56495858f2814d1f61a18cce4a996fae0d7b2f49af6b6e9e0dc12b139724dbaad07ac9904b6d4910cf02
-
Filesize
633KB
MD5764cb439deb85a06073c46f475956fc4
SHA1cfd265f85f54b84b0ce27d9d3a68fef3d6974b49
SHA2569db20870570e93875292e6a6a5f7683982cbe675135032c7dafc2b9704f3cb06
SHA512109976d83b59dbf1045cf6ce0d4c813424e97318b66a56495858f2814d1f61a18cce4a996fae0d7b2f49af6b6e9e0dc12b139724dbaad07ac9904b6d4910cf02
-
Filesize
633KB
MD5764cb439deb85a06073c46f475956fc4
SHA1cfd265f85f54b84b0ce27d9d3a68fef3d6974b49
SHA2569db20870570e93875292e6a6a5f7683982cbe675135032c7dafc2b9704f3cb06
SHA512109976d83b59dbf1045cf6ce0d4c813424e97318b66a56495858f2814d1f61a18cce4a996fae0d7b2f49af6b6e9e0dc12b139724dbaad07ac9904b6d4910cf02
-
Filesize
633KB
MD5764cb439deb85a06073c46f475956fc4
SHA1cfd265f85f54b84b0ce27d9d3a68fef3d6974b49
SHA2569db20870570e93875292e6a6a5f7683982cbe675135032c7dafc2b9704f3cb06
SHA512109976d83b59dbf1045cf6ce0d4c813424e97318b66a56495858f2814d1f61a18cce4a996fae0d7b2f49af6b6e9e0dc12b139724dbaad07ac9904b6d4910cf02