Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
25-08-2023 10:58
Static task
static1
Behavioral task
behavioral1
Sample
3.rtf
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
3.rtf
Resource
win10v2004-20230703-en
General
-
Target
3.rtf
-
Size
65KB
-
MD5
a1816ace062bdbcb202e580810d5aceb
-
SHA1
d58ffa926fe4a58bf7ac76d994f9a576cf62fd1d
-
SHA256
1ee34dc849cd10bab8d08dec7076ab644851c55a1765de44e8187a53c137569b
-
SHA512
630f871ce4505f0d881a43ab540a1b92ec9d1be6a47f68c30f6fc110e4dae9d40672d4560c7b10cd8168d923f5292b4d285d99bd7377a57d681cf06ed6331625
-
SSDEEP
1536:TwAlReA72q/FbwzaXXJY7JrZC2KPJAOQnnYA+1xt7tuTQj0VEba2Uy0wddJaps:TwAln//FbwzaXXJQJrZC2KPjQnn9kxtj
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
server320.web-hosting.com - Port:
587 - Username:
[email protected] - Password:
B5TEK}%;g6L7 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2960 EQNEDT32.EXE -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2944 nellytm47568.exe 2132 nellytm47568.exe -
Loads dropped DLL 2 IoCs
pid Process 2960 EQNEDT32.EXE 2960 EQNEDT32.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4159544280-4273523227-683900707-1000\Software\Microsoft\Windows\CurrentVersion\Run\RMBJLaF = "C:\\Users\\Admin\\AppData\\Roaming\\RMBJLaF\\RMBJLaF.exe" nellytm47568.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2944 set thread context of 2132 2944 nellytm47568.exe 35 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2960 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2536 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 nellytm47568.exe 2132 nellytm47568.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2132 nellytm47568.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 WINWORD.EXE 2536 WINWORD.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2944 2960 EQNEDT32.EXE 29 PID 2960 wrote to memory of 2944 2960 EQNEDT32.EXE 29 PID 2960 wrote to memory of 2944 2960 EQNEDT32.EXE 29 PID 2960 wrote to memory of 2944 2960 EQNEDT32.EXE 29 PID 2536 wrote to memory of 1644 2536 WINWORD.EXE 34 PID 2536 wrote to memory of 1644 2536 WINWORD.EXE 34 PID 2536 wrote to memory of 1644 2536 WINWORD.EXE 34 PID 2536 wrote to memory of 1644 2536 WINWORD.EXE 34 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35 PID 2944 wrote to memory of 2132 2944 nellytm47568.exe 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3.rtf"1⤵
- Drops file in Windows directory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1644
-
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Roaming\nellytm47568.exe"C:\Users\Admin\AppData\Roaming\nellytm47568.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\nellytm47568.exe"C:\Users\Admin\AppData\Roaming\nellytm47568.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c9cbb43099ea4e8ed5272d7b6fb13e45
SHA1dc80003a0e342dec811f31600b942559f41455be
SHA2566d6bc23de4bf14e61f35cc066deab9000db3fe4b6f54eb102b6b13eedd4049fd
SHA512d08a3b230dcfb9ee9db53784c5e582c2631f758871f6f68ebcb894efa859243344d4a5258d70a2ed85d9ab5410d4febe1df152ec67db5496d2b56126798efba3
-
Filesize
790KB
MD507926f7473fff4bb9d41b460cb71b550
SHA1fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8
SHA2565eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0
SHA512c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf
-
Filesize
790KB
MD507926f7473fff4bb9d41b460cb71b550
SHA1fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8
SHA2565eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0
SHA512c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf
-
Filesize
790KB
MD507926f7473fff4bb9d41b460cb71b550
SHA1fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8
SHA2565eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0
SHA512c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf
-
Filesize
790KB
MD507926f7473fff4bb9d41b460cb71b550
SHA1fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8
SHA2565eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0
SHA512c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf
-
Filesize
790KB
MD507926f7473fff4bb9d41b460cb71b550
SHA1fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8
SHA2565eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0
SHA512c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf
-
Filesize
790KB
MD507926f7473fff4bb9d41b460cb71b550
SHA1fb0edc87b5b710f76da29bdd5b5ec73285f7c1e8
SHA2565eafaa5f16cc37fad487678452867359480a85a78a82e7521aae029f426e69f0
SHA512c8ff2fd52be69960856ec00c252470105c7312648d4edf9fbfe1e9e56f0b2bca4d48435c384e02b0fe7f41394edea55b9ee8e8200f2b031fadef9150f530a4cf