Analysis

  • max time kernel
    153s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    27/11/2023, 12:02

General

  • Target

    2.docx

  • Size

    16KB

  • MD5

    74a1be4072cdff7d23292d65ad2112a3

  • SHA1

    2df97ec0e50130b764d5b777a328da4ce5ba49d9

  • SHA256

    5ce58c49f5abc817c193a24964f2abb75db9caafe37d3901cba27cadb872e0a8

  • SHA512

    0fea42e33b8a3e3c56a1a0b570f3f087c901e1e5e4a6a93b34610bfe4c07808bb0cbab6ee543192cf21189f57b823edf01112812fec6b791005333e0ab475287

  • SSDEEP

    384:uyXfh2hWqs8PL8wi4OEwH8TIbE91r2fRaJYdviiHI5//r:ucfKR5P3DOqnYJEMvXHI5/T

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2848
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2392
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Roaming\wealth49980.exe
        "C:\Users\Admin\AppData\Roaming\wealth49980.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2992
        • C:\Users\Admin\AppData\Roaming\wealth49980.exe
          "C:\Users\Admin\AppData\Roaming\wealth49980.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2312

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            cb73447f65f001f3efa72a7b3f292885

            SHA1

            aa05ae41a97b0af51d01bc38d19c0606a20e8b36

            SHA256

            0bc0f758e33cb35d0c90a43d0482c764f9978a5422937064c06853e5f9a67bf9

            SHA512

            5b4450a47c746a1e569b20e80376acec30fa92922d800f7bed951880d3c5a2efb51f61f8675a0c41230a52fbc9b5b98fecebc4fe3f89382ad53fd7379e56d790

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{3AC742F4-A2A6-4A52-A752-CDEEF8E6215D}.FSD

            Filesize

            128KB

            MD5

            b4ae7430910b1d49df0796225b19dc78

            SHA1

            b0a51dff586c86fcaa44b1681ef1bd9521ddc4b5

            SHA256

            202dd89209ed3d89a918a2ef9270a581562e83db4dcbe2295a1cb5e420a85193

            SHA512

            7809a5105f7e9a30c1cce766fc8f6592f86a15bf521d3f7058265fc452a5a5d82a8ddbfea7568114c7a657840f86f79739c2edbe233b12640de386cb56d06110

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            c33c7549921c8cd06ffb74a33583f7c8

            SHA1

            bc4c3f9b8da1b0d1f02d5482eed4f353e8aba389

            SHA256

            f52ab4272c6b49a6459e0b4bab32ce525e28a0dff0fd45d51756a51a496d9c70

            SHA512

            fc0cf990a3215bb2b7afcbda0224f236290d5f6ddc2d6b73deabf3aad48f1276535ff256155be11bf31263edf68ad01d82ca8d6dc93873ba6f65a6e92e1dd017

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            3b2f04d6f411506b5660f44cc4726c5f

            SHA1

            2b4459104dc67e3708fcf2cb874787733d366e26

            SHA256

            82fd9082f0a81d152ef33dacf26ba5ceb731f35f6a7570422a5312c985eca453

            SHA512

            e99fec1238e8a75670eed15a51b6ca5b63ce53a1b70d32a33158a66fe2cd5cff96999b8e6cae5b21858976eacd3ca9783f7df8a50e21f3c1064bba2735ec7eae

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D7DE53FB-38DD-4253-9E76-76FC5D55D41A}.FSD

            Filesize

            128KB

            MD5

            33959b7e0264be64c7fffe7f4be983e4

            SHA1

            f837470b86b3077ca747b8ab703c78def32dc293

            SHA256

            4191a7f1144a49b6fd0ca70de7bee1d647ddccd98c1b59f0e1674db348e012ce

            SHA512

            89dfb2e37906515a03c2eadfd95126196eb7e8210faa041312b1a4d326951d0d30b82ee92fd7f043bb76f69200bad2f29c042eea589631d1616cf0f91ab8bea5

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\wealthzx[1].doc

            Filesize

            118KB

            MD5

            1f2373aba2cf8216002fcb4c5eefb2eb

            SHA1

            1e913703986cea4412fbeaff3e1c369d6667194e

            SHA256

            d401ada740ec43f6c95d41179032282255f7d786058d8a39bdb5c4251b2a69ca

            SHA512

            e79731b2d3900659dfe851142b5fa2ef363314d857928cfbf494ff5f17b437156da698b754c90f6b7a02d35708fc6225c69acc86acb936c9f7878508d921addd

          • C:\Users\Admin\AppData\Local\Temp\{D99B266C-4C24-4D31-8808-7EAC182E8F11}

            Filesize

            128KB

            MD5

            64855804cdba6db2d28160c02da7e048

            SHA1

            9a3c46f0fffa6234396437d26cd5a900a0687fa2

            SHA256

            6f318b3556249ee842851015a1310cd272d94401cb6cdc31dc22f4bbf0188450

            SHA512

            7dc4f71900b901599db601fe648e3bf1ab8615512f17ba3731d67442e4ab8673ef3d7b03887f4f7b8d1ffee1327f9582c75a51d3f651f18cb74ed27a97b487fc

          • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Roaming\wealth49980.exe

            Filesize

            722KB

            MD5

            bec11ca3a3a72fbb4b93e078f03b2e78

            SHA1

            7f58e12d01bf9e350a512644617d6d916a31b478

            SHA256

            d5268264e03035ae08616679859a12d0652285022884342333b068c226a209a5

            SHA512

            9fedd543abb7203dffbc90f0dc0cbc8e5e6ac723270dbc2358ca68127842103fd68a7e8cb262553120d92dce919f22fd2366ef6bc5ef2159874fe85a9ea4870c

          • C:\Users\Admin\AppData\Roaming\wealth49980.exe

            Filesize

            722KB

            MD5

            bec11ca3a3a72fbb4b93e078f03b2e78

            SHA1

            7f58e12d01bf9e350a512644617d6d916a31b478

            SHA256

            d5268264e03035ae08616679859a12d0652285022884342333b068c226a209a5

            SHA512

            9fedd543abb7203dffbc90f0dc0cbc8e5e6ac723270dbc2358ca68127842103fd68a7e8cb262553120d92dce919f22fd2366ef6bc5ef2159874fe85a9ea4870c

          • C:\Users\Admin\AppData\Roaming\wealth49980.exe

            Filesize

            722KB

            MD5

            bec11ca3a3a72fbb4b93e078f03b2e78

            SHA1

            7f58e12d01bf9e350a512644617d6d916a31b478

            SHA256

            d5268264e03035ae08616679859a12d0652285022884342333b068c226a209a5

            SHA512

            9fedd543abb7203dffbc90f0dc0cbc8e5e6ac723270dbc2358ca68127842103fd68a7e8cb262553120d92dce919f22fd2366ef6bc5ef2159874fe85a9ea4870c

          • C:\Users\Admin\AppData\Roaming\wealth49980.exe

            Filesize

            722KB

            MD5

            bec11ca3a3a72fbb4b93e078f03b2e78

            SHA1

            7f58e12d01bf9e350a512644617d6d916a31b478

            SHA256

            d5268264e03035ae08616679859a12d0652285022884342333b068c226a209a5

            SHA512

            9fedd543abb7203dffbc90f0dc0cbc8e5e6ac723270dbc2358ca68127842103fd68a7e8cb262553120d92dce919f22fd2366ef6bc5ef2159874fe85a9ea4870c

          • \Users\Admin\AppData\Roaming\wealth49980.exe

            Filesize

            722KB

            MD5

            bec11ca3a3a72fbb4b93e078f03b2e78

            SHA1

            7f58e12d01bf9e350a512644617d6d916a31b478

            SHA256

            d5268264e03035ae08616679859a12d0652285022884342333b068c226a209a5

            SHA512

            9fedd543abb7203dffbc90f0dc0cbc8e5e6ac723270dbc2358ca68127842103fd68a7e8cb262553120d92dce919f22fd2366ef6bc5ef2159874fe85a9ea4870c

          • memory/2312-125-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2312-121-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2312-136-0x0000000004980000-0x00000000049C0000-memory.dmp

            Filesize

            256KB

          • memory/2312-135-0x000000006B1B0000-0x000000006B89E000-memory.dmp

            Filesize

            6.9MB

          • memory/2312-134-0x000000006B1B0000-0x000000006B89E000-memory.dmp

            Filesize

            6.9MB

          • memory/2312-132-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2312-130-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2312-127-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2312-124-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2312-123-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2312-119-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-2-0x000000007177D000-0x0000000071788000-memory.dmp

            Filesize

            44KB

          • memory/2848-0-0x000000002F031000-0x000000002F032000-memory.dmp

            Filesize

            4KB

          • memory/2848-116-0x000000007177D000-0x0000000071788000-memory.dmp

            Filesize

            44KB

          • memory/2848-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2992-118-0x0000000005A30000-0x0000000005AC0000-memory.dmp

            Filesize

            576KB

          • memory/2992-117-0x0000000000780000-0x000000000078A000-memory.dmp

            Filesize

            40KB

          • memory/2992-96-0x0000000000070000-0x000000000012A000-memory.dmp

            Filesize

            744KB

          • memory/2992-104-0x0000000000540000-0x0000000000548000-memory.dmp

            Filesize

            32KB

          • memory/2992-103-0x0000000000760000-0x000000000077A000-memory.dmp

            Filesize

            104KB

          • memory/2992-133-0x000000006B1B0000-0x000000006B89E000-memory.dmp

            Filesize

            6.9MB

          • memory/2992-102-0x0000000004BC0000-0x0000000004C00000-memory.dmp

            Filesize

            256KB

          • memory/2992-97-0x000000006B1B0000-0x000000006B89E000-memory.dmp

            Filesize

            6.9MB