Analysis

  • max time kernel
    134s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2023 14:03

General

  • Target

    TT Copy.xls

  • Size

    381KB

  • MD5

    26beb641321ce859d389a80ccd1416d9

  • SHA1

    8a47f46ab9f3ed5fd132cd8f30ece15e6c47cf21

  • SHA256

    3c756278503cd67e4ca18fa2acbba31c308153b5801f24b222a42b4b3331c780

  • SHA512

    02c1f0b615d33f941d6a8a227fb9845bedbd01eee4a587368b95fb83bcf0ff16b4f9738aa7caaf65a9c7373bb9711e4f504bfc50a7dabf97b54fe1cf26239f5b

  • SSDEEP

    6144:hn1m9kdb41yFtrP+9LFRLLckUXWnNFFtx/4pvbS3SF18XpzeHfOSWZJOOeRs5mOG:hOecoFt+LFRSWznxwdQBpKHfIeRKmOr6

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.experthvac.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -8{jszMOY*Z8(~Za0#jyP%o7VoB.0)kk^)7_

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\TT Copy.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:884
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2596
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1104
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
            PID:2944
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            3⤵
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • outlook_office_path
            • outlook_win_path
            PID:1892

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B54BE748-A883-4DF2-BCE1-730FD3B91D42}.FSD

        Filesize

        128KB

        MD5

        cb955b0b514ab2594f98592e049d2fee

        SHA1

        b34b6ef9fd915c9f807522ab6a2d57af3b33530a

        SHA256

        42629d35eb4ea8d1bbfc1973bc14901ce914372ea20c86e140e132ae7bff13b7

        SHA512

        2a8a45d1ac2b618cfeaa50b376d7e9a5c6b71ea73d52696e1f7ed25849f64a3a018e78f287c1e73f76681250784ece618b41bb447c44377cd27cf4fee1655bf6

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        f7990480f1c50cd05c681e459b863d0c

        SHA1

        57f6861c7ed615bcc484bcbf1e52d2f3ddb09908

        SHA256

        077de50cf14cef9805cfc2ac18b310035493eb5f3c87f3a68da9615d16a4b828

        SHA512

        0fc3e8e3a947bf3d11701c4bd5ddbe4a0256391dd2e8df0e253c97b350b654e1c0170a425bfa0fd23b8e90be2b3c248af8806845d0e7c603c0c57dca8baf20b0

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{7CCCB1EB-3B86-43B9-988C-5BB723F2E6D8}.FSD

        Filesize

        128KB

        MD5

        0d1cb99aff4c0e706712abc92b20a9d1

        SHA1

        3b13cb8e8cac0c7a9eeaf134f57a464303a7301f

        SHA256

        a1b419cb9bb73793b3574d099e0a9dd032945156551bf9d190fb42d01b6be3d8

        SHA512

        ed3ac5fe7224ff7c4a9a6cc99525ec13daee3c04f7f9fe8fb20014e14b12bacb0f656bd6531e369c51ded557e33c69951e86317ce5bad493a117106dd3c4a870

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOB1G6ZJ\microsoftEdgedeletedentirehistorycachehistoryfromthepc[1].doc

        Filesize

        61KB

        MD5

        9e0226adf02222bbee9aa7e2f6f1c07a

        SHA1

        64e031bda28509528f26a64ac5d7935cf5afe426

        SHA256

        632f7e212cc149d81b322def328534953b979d1f1885140e2645e4ac41d0f56c

        SHA512

        687e89fd04f39817432dec1f43754f18f77bda0f96e6fff1a24e00df3fdd0ab6831f39fb1c90240ce128c2dad34c5e43a7f7efcfb34052b02c634a0204595c90

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C5AB7B3C.doc

        Filesize

        61KB

        MD5

        9e0226adf02222bbee9aa7e2f6f1c07a

        SHA1

        64e031bda28509528f26a64ac5d7935cf5afe426

        SHA256

        632f7e212cc149d81b322def328534953b979d1f1885140e2645e4ac41d0f56c

        SHA512

        687e89fd04f39817432dec1f43754f18f77bda0f96e6fff1a24e00df3fdd0ab6831f39fb1c90240ce128c2dad34c5e43a7f7efcfb34052b02c634a0204595c90

      • C:\Users\Admin\AppData\Local\Temp\{EEED5645-E3AA-4585-A818-91F1F7C71509}

        Filesize

        128KB

        MD5

        62c77e80fc1d21719051cfc26e6d0c94

        SHA1

        6b26536e34a18d20c059bf5f88fba0b96b72ddb2

        SHA256

        80cf544ae74a18d7a4131f0c98e7eb207c3600ac1d1813da5aed1aa861477944

        SHA512

        32f36fa928df0373b04896c3f175f53c4dcc7fbab4bcfec5bb4535ce88e1d3bf1a895f43720eef3fccb54b7028e91a03e10499951afd8055af289a4838813c27

      • C:\Users\Admin\AppData\Roaming\wlanext.exe

        Filesize

        823KB

        MD5

        3713c253ab56bf85aaa806fc41cc6905

        SHA1

        cf59aac87590bb5f3bba092f20455b097a1ffab5

        SHA256

        ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

        SHA512

        ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

      • C:\Users\Admin\AppData\Roaming\wlanext.exe

        Filesize

        823KB

        MD5

        3713c253ab56bf85aaa806fc41cc6905

        SHA1

        cf59aac87590bb5f3bba092f20455b097a1ffab5

        SHA256

        ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

        SHA512

        ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

      • C:\Users\Admin\AppData\Roaming\wlanext.exe

        Filesize

        823KB

        MD5

        3713c253ab56bf85aaa806fc41cc6905

        SHA1

        cf59aac87590bb5f3bba092f20455b097a1ffab5

        SHA256

        ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

        SHA512

        ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

      • \Users\Admin\AppData\Roaming\wlanext.exe

        Filesize

        823KB

        MD5

        3713c253ab56bf85aaa806fc41cc6905

        SHA1

        cf59aac87590bb5f3bba092f20455b097a1ffab5

        SHA256

        ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

        SHA512

        ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

      • \Users\Admin\AppData\Roaming\wlanext.exe

        Filesize

        823KB

        MD5

        3713c253ab56bf85aaa806fc41cc6905

        SHA1

        cf59aac87590bb5f3bba092f20455b097a1ffab5

        SHA256

        ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

        SHA512

        ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

      • memory/884-8-0x00000000030D0000-0x00000000030D2000-memory.dmp

        Filesize

        8KB

      • memory/884-1-0x00000000723CD000-0x00000000723D8000-memory.dmp

        Filesize

        44KB

      • memory/884-104-0x00000000723CD000-0x00000000723D8000-memory.dmp

        Filesize

        44KB

      • memory/884-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/1892-130-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1892-135-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1892-132-0x0000000000400000-0x0000000000430000-memory.dmp

        Filesize

        192KB

      • memory/1892-127-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2172-101-0x000000006A730000-0x000000006AE1E000-memory.dmp

        Filesize

        6.9MB

      • memory/2172-109-0x0000000001F30000-0x0000000001F4A000-memory.dmp

        Filesize

        104KB

      • memory/2172-102-0x0000000004D40000-0x0000000004D80000-memory.dmp

        Filesize

        256KB

      • memory/2172-99-0x00000000002B0000-0x0000000000384000-memory.dmp

        Filesize

        848KB

      • memory/2172-106-0x000000006A730000-0x000000006AE1E000-memory.dmp

        Filesize

        6.9MB

      • memory/2172-107-0x0000000004D40000-0x0000000004D80000-memory.dmp

        Filesize

        256KB

      • memory/2172-108-0x0000000004D40000-0x0000000004D80000-memory.dmp

        Filesize

        256KB

      • memory/2172-129-0x0000000004D40000-0x0000000004D80000-memory.dmp

        Filesize

        256KB

      • memory/2172-110-0x0000000000800000-0x0000000000806000-memory.dmp

        Filesize

        24KB

      • memory/2172-103-0x0000000004600000-0x0000000004644000-memory.dmp

        Filesize

        272KB

      • memory/2172-133-0x000000006A730000-0x000000006AE1E000-memory.dmp

        Filesize

        6.9MB

      • memory/2596-5-0x00000000723CD000-0x00000000723D8000-memory.dmp

        Filesize

        44KB

      • memory/2596-3-0x000000002F0A1000-0x000000002F0A2000-memory.dmp

        Filesize

        4KB

      • memory/2596-7-0x00000000037A0000-0x00000000037A2000-memory.dmp

        Filesize

        8KB

      • memory/2596-105-0x00000000723CD000-0x00000000723D8000-memory.dmp

        Filesize

        44KB

      • memory/2944-111-0x0000000000090000-0x00000000000C0000-memory.dmp

        Filesize

        192KB

      • memory/2944-117-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2944-116-0x0000000000090000-0x00000000000C0000-memory.dmp

        Filesize

        192KB

      • memory/2944-115-0x0000000000090000-0x00000000000C0000-memory.dmp

        Filesize

        192KB

      • memory/2944-113-0x0000000000090000-0x00000000000C0000-memory.dmp

        Filesize

        192KB