Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2023 08:13

General

  • Target

    NEAS.20728d460c5c42cbd40ad4c4bcffa85013f4763501b561acccf23d76c871894d.xls

  • Size

    938KB

  • MD5

    b6e5689997ab86f037c75abe3478ed5d

  • SHA1

    8f274288e21c4907690c0925e9a4fd44293cf3af

  • SHA256

    20728d460c5c42cbd40ad4c4bcffa85013f4763501b561acccf23d76c871894d

  • SHA512

    44a4dd6dbad49bf2ef26259d9e82711a23badae938e891103f24eb2ed9fa37749ef5434807bed1728419a10a71409c02465415f434aece6c7f976b314a55d123

  • SSDEEP

    24576:g/BHw6/BZy83bVmEgTIZ3v5bJvuwAYyv4OL5udmwNx:D6/rt3bVm7TGRVvuwcQO1ni

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.bretoffice.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    }&HF=G!r!_eA

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\NEAS.20728d460c5c42cbd40ad4c4bcffa85013f4763501b561acccf23d76c871894d.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2376
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Roaming\unsecapp.exe
      "C:\Users\Admin\AppData\Roaming\unsecapp.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2592

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    92ce6b962f90ace340e155ee9f5baa4b

    SHA1

    77919b1d422359ac25f81e31517b460a47c0f4e0

    SHA256

    9727216f5345283783758a2aa075c5f71277681d80da2ab08b5e3915fee8367d

    SHA512

    79a310b84338d4b56ee7a7abc6639834e42d781a6ee7f8c5da5ec53accaa2d42eba0b845568c6d44e85901b1c730d65b3e0addd56dafe7737a42b306726e2cd4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\6E2E05EF.emf

    Filesize

    1.4MB

    MD5

    a01b9617553432807b9b58025b338d97

    SHA1

    439bdcc450408b9735b2428c2d53d2e6977fa58c

    SHA256

    7a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce

    SHA512

    312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee

  • C:\Users\Admin\AppData\Local\Temp\Cab6347.tmp

    Filesize

    61KB

    MD5

    f3441b8572aae8801c04f3060b550443

    SHA1

    4ef0a35436125d6821831ef36c28ffaf196cda15

    SHA256

    6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

    SHA512

    5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

  • C:\Users\Admin\AppData\Local\Temp\Tar6473.tmp

    Filesize

    163KB

    MD5

    9441737383d21192400eca82fda910ec

    SHA1

    725e0d606a4fc9ba44aa8ffde65bed15e65367e4

    SHA256

    bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

    SHA512

    7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

  • C:\Users\Admin\AppData\Roaming\unsecapp.exe

    Filesize

    240KB

    MD5

    754ce856887cc1da00e95d45c5163075

    SHA1

    c22455ba6ae04920379aea150c0fcbfb4bb04210

    SHA256

    28fdb04c466bfb70a6b98c5d11c99c78ab9bab25cc7ede218218cabd7fe4d777

    SHA512

    ef93915010417f6fa0264d38eb4f19948ccb91868e7913abb0e49f962738be25fb78dfc5ca1b15416a9aa8b843a37867a307434eb3b0f7f1cf48a5a11b768a00

  • C:\Users\Admin\AppData\Roaming\unsecapp.exe

    Filesize

    240KB

    MD5

    754ce856887cc1da00e95d45c5163075

    SHA1

    c22455ba6ae04920379aea150c0fcbfb4bb04210

    SHA256

    28fdb04c466bfb70a6b98c5d11c99c78ab9bab25cc7ede218218cabd7fe4d777

    SHA512

    ef93915010417f6fa0264d38eb4f19948ccb91868e7913abb0e49f962738be25fb78dfc5ca1b15416a9aa8b843a37867a307434eb3b0f7f1cf48a5a11b768a00

  • C:\Users\Admin\AppData\Roaming\unsecapp.exe

    Filesize

    240KB

    MD5

    754ce856887cc1da00e95d45c5163075

    SHA1

    c22455ba6ae04920379aea150c0fcbfb4bb04210

    SHA256

    28fdb04c466bfb70a6b98c5d11c99c78ab9bab25cc7ede218218cabd7fe4d777

    SHA512

    ef93915010417f6fa0264d38eb4f19948ccb91868e7913abb0e49f962738be25fb78dfc5ca1b15416a9aa8b843a37867a307434eb3b0f7f1cf48a5a11b768a00

  • \Users\Admin\AppData\Roaming\unsecapp.exe

    Filesize

    240KB

    MD5

    754ce856887cc1da00e95d45c5163075

    SHA1

    c22455ba6ae04920379aea150c0fcbfb4bb04210

    SHA256

    28fdb04c466bfb70a6b98c5d11c99c78ab9bab25cc7ede218218cabd7fe4d777

    SHA512

    ef93915010417f6fa0264d38eb4f19948ccb91868e7913abb0e49f962738be25fb78dfc5ca1b15416a9aa8b843a37867a307434eb3b0f7f1cf48a5a11b768a00

  • \Users\Admin\AppData\Roaming\unsecapp.exe

    Filesize

    240KB

    MD5

    754ce856887cc1da00e95d45c5163075

    SHA1

    c22455ba6ae04920379aea150c0fcbfb4bb04210

    SHA256

    28fdb04c466bfb70a6b98c5d11c99c78ab9bab25cc7ede218218cabd7fe4d777

    SHA512

    ef93915010417f6fa0264d38eb4f19948ccb91868e7913abb0e49f962738be25fb78dfc5ca1b15416a9aa8b843a37867a307434eb3b0f7f1cf48a5a11b768a00

  • memory/2376-132-0x0000000071FAD000-0x0000000071FB8000-memory.dmp

    Filesize

    44KB

  • memory/2376-119-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2376-110-0x0000000071FAD000-0x0000000071FB8000-memory.dmp

    Filesize

    44KB

  • memory/2376-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2376-1-0x0000000071FAD000-0x0000000071FB8000-memory.dmp

    Filesize

    44KB

  • memory/2592-29-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-111-0x000000006C050000-0x000000006C73E000-memory.dmp

    Filesize

    6.9MB

  • memory/2592-28-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-31-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-30-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2592-27-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-33-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-36-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-37-0x000000006C050000-0x000000006C73E000-memory.dmp

    Filesize

    6.9MB

  • memory/2592-38-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/2592-26-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2592-112-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/2792-34-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-23-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB

  • memory/2792-24-0x00000000024B0000-0x0000000002530000-memory.dmp

    Filesize

    512KB

  • memory/2792-25-0x0000000000580000-0x000000000058A000-memory.dmp

    Filesize

    40KB

  • memory/2792-22-0x0000000000530000-0x0000000000570000-memory.dmp

    Filesize

    256KB

  • memory/2792-21-0x000007FEF55F0000-0x000007FEF5FDC000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-20-0x000000013FE90000-0x000000013FECE000-memory.dmp

    Filesize

    248KB