Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2023 14:51

General

  • Target

    ORDER N. F-1676.23.xls

  • Size

    392KB

  • MD5

    3408974acb99e7eb86e75d116d3cbe08

  • SHA1

    1d4e5df1f326f6239038b4631d3041f8c8bce8b0

  • SHA256

    ba24230fc982ae4d2ef597abf179e4cdebce6cbed76ea929a636821309d1e29f

  • SHA512

    40c04a8e8c0232fefb623bd845597f30f0cca6ba34fe041a22d14234efe55a25b1d1ad4b9ef753fe641ff293477ff943443256bee2c00b8c2a51062dab6db2d6

  • SSDEEP

    6144:Gn1m9kdbvPpeZkVl3S4qQygZpuUXyRcVlgTf+0W8r8NR/+zTlsvsgYtZlTTDyrh:GOeLtni5XgZTyqVGruU5lTSrh

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\ORDER N. F-1676.23.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2168
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:572
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Roaming\wlanext.exe
          "C:\Users\Admin\AppData\Roaming\wlanext.exe"
          3⤵
          • Executes dropped EXE
          PID:2320
        • C:\Users\Admin\AppData\Roaming\wlanext.exe
          "C:\Users\Admin\AppData\Roaming\wlanext.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2312

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{45592181-EC85-4772-A1C6-CF412168EF53}.FSD

      Filesize

      128KB

      MD5

      c65683b98b2f9d1c4694a2390533a626

      SHA1

      1e207bd244c56386e7eccf484d9e5fed57fe398b

      SHA256

      f3e7dabe02445c8042f8af4b2a8ae58dca55224882526d4b365526dd61caf664

      SHA512

      0f5934a7895ee688daf39a972190e478734b66ceeedcb265b69b5fce84f11bcce34761a213c12afe9447795bb38d70a7f6e4596c611d51a8f79bdc058507e8c8

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      4cb31df5ad1aafa3be06063f854cdf6d

      SHA1

      8ef9235f9fd315341222e05f7b5037a253f6d262

      SHA256

      075fa11a21ab9ad70ed6696fb3f237d7f41e1841ccbfa37dac3f69076eaff126

      SHA512

      0bf96a0433bc0b0342cff3a86417172a18d2b34661c04fe1159478d8c90b1212f9ec9d231a116ed24ea2850d364da9e701be8a586c35d4c1b2e20c9e15ab0952

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{F287291F-AFC2-4101-B46F-5F069003A2D2}.FSD

      Filesize

      128KB

      MD5

      797c55e956c727c22e11ed30bd5c60de

      SHA1

      1078c5e15b7d12d3c8510d437bbace9f25535841

      SHA256

      163e29773cc1f98f34312a3df9554971435137d427245671a0fece750f966d31

      SHA512

      4c36fb702fd7792dd40179a0cd50754e8df66e86994db9d4060d583bbf9319f8d3a4f92f2cb9f87cc176c6c7d8cd1b6047b000c2f4181d55190aa4cbee83c013

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\microsoftwantedtodeletentirehistorycookiecatchfromthepc[1].doc

      Filesize

      59KB

      MD5

      43d5050828367e6acd6e91d427a3d6b0

      SHA1

      cafde44228fc2405f86ab6f74c95d3a646a39794

      SHA256

      dfc414c8615ead5e2c41955aeeaad2369074c489f96a7b45becc668d647ea592

      SHA512

      e2beb21694b8c4999c059cd74af4c05096fd94aae936acbad1aab78d22d569797bd9fac173a9cf59e509d39fb38fb392a67f14dfd63addcc0c44d68861b8b3a4

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\4AB18606.doc

      Filesize

      59KB

      MD5

      43d5050828367e6acd6e91d427a3d6b0

      SHA1

      cafde44228fc2405f86ab6f74c95d3a646a39794

      SHA256

      dfc414c8615ead5e2c41955aeeaad2369074c489f96a7b45becc668d647ea592

      SHA512

      e2beb21694b8c4999c059cd74af4c05096fd94aae936acbad1aab78d22d569797bd9fac173a9cf59e509d39fb38fb392a67f14dfd63addcc0c44d68861b8b3a4

    • C:\Users\Admin\AppData\Local\Temp\{9420D8A8-D23C-48AA-967D-AE9FE4C7F0E4}

      Filesize

      128KB

      MD5

      9b22b186dae1f914577e05731569de27

      SHA1

      43905f79ca7d38c75e0a44edfe3ec86ebe6ec5e9

      SHA256

      7705b752c5edb2869d9159e01e65cb8b9ffac50296620a8e06b4f281d699a367

      SHA512

      36e4b64a5d3488f4dae16ea2774b13b67f240c35ebe185ab89bb2cb46ff44bc01a238577b0e31cbe857100d9e80ec528d0b132e1607a73df243728edacea5f56

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      721KB

      MD5

      9693b790d2e6a6a57a00d77d1d118073

      SHA1

      1aafdddba11f2747b013de3ac8ff581470318b52

      SHA256

      f49b665e011ce87a1e9bd296cc8010c4976d1592e76b4daeaec91a1b6437ea8f

      SHA512

      d609f2d4f8971616546360c6066a1714d7fc73db2b58ef98b864721d6cdf1483b1a8b881794f620079ff485575aa668f1adc6ad3d5fcccf4360784f60ea05d31

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      721KB

      MD5

      9693b790d2e6a6a57a00d77d1d118073

      SHA1

      1aafdddba11f2747b013de3ac8ff581470318b52

      SHA256

      f49b665e011ce87a1e9bd296cc8010c4976d1592e76b4daeaec91a1b6437ea8f

      SHA512

      d609f2d4f8971616546360c6066a1714d7fc73db2b58ef98b864721d6cdf1483b1a8b881794f620079ff485575aa668f1adc6ad3d5fcccf4360784f60ea05d31

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      721KB

      MD5

      9693b790d2e6a6a57a00d77d1d118073

      SHA1

      1aafdddba11f2747b013de3ac8ff581470318b52

      SHA256

      f49b665e011ce87a1e9bd296cc8010c4976d1592e76b4daeaec91a1b6437ea8f

      SHA512

      d609f2d4f8971616546360c6066a1714d7fc73db2b58ef98b864721d6cdf1483b1a8b881794f620079ff485575aa668f1adc6ad3d5fcccf4360784f60ea05d31

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      721KB

      MD5

      9693b790d2e6a6a57a00d77d1d118073

      SHA1

      1aafdddba11f2747b013de3ac8ff581470318b52

      SHA256

      f49b665e011ce87a1e9bd296cc8010c4976d1592e76b4daeaec91a1b6437ea8f

      SHA512

      d609f2d4f8971616546360c6066a1714d7fc73db2b58ef98b864721d6cdf1483b1a8b881794f620079ff485575aa668f1adc6ad3d5fcccf4360784f60ea05d31

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      721KB

      MD5

      9693b790d2e6a6a57a00d77d1d118073

      SHA1

      1aafdddba11f2747b013de3ac8ff581470318b52

      SHA256

      f49b665e011ce87a1e9bd296cc8010c4976d1592e76b4daeaec91a1b6437ea8f

      SHA512

      d609f2d4f8971616546360c6066a1714d7fc73db2b58ef98b864721d6cdf1483b1a8b881794f620079ff485575aa668f1adc6ad3d5fcccf4360784f60ea05d31

    • \Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      721KB

      MD5

      9693b790d2e6a6a57a00d77d1d118073

      SHA1

      1aafdddba11f2747b013de3ac8ff581470318b52

      SHA256

      f49b665e011ce87a1e9bd296cc8010c4976d1592e76b4daeaec91a1b6437ea8f

      SHA512

      d609f2d4f8971616546360c6066a1714d7fc73db2b58ef98b864721d6cdf1483b1a8b881794f620079ff485575aa668f1adc6ad3d5fcccf4360784f60ea05d31

    • memory/1100-104-0x0000000000370000-0x000000000037A000-memory.dmp

      Filesize

      40KB

    • memory/1100-105-0x0000000005C60000-0x0000000005CDA000-memory.dmp

      Filesize

      488KB

    • memory/1100-119-0x000000006A450000-0x000000006AB3E000-memory.dmp

      Filesize

      6.9MB

    • memory/1100-103-0x0000000000360000-0x0000000000368000-memory.dmp

      Filesize

      32KB

    • memory/1100-96-0x0000000000E10000-0x0000000000ECA000-memory.dmp

      Filesize

      744KB

    • memory/1100-98-0x000000006A450000-0x000000006AB3E000-memory.dmp

      Filesize

      6.9MB

    • memory/1100-99-0x0000000004D20000-0x0000000004D60000-memory.dmp

      Filesize

      256KB

    • memory/1100-100-0x0000000000340000-0x0000000000358000-memory.dmp

      Filesize

      96KB

    • memory/2168-101-0x000000007208D000-0x0000000072098000-memory.dmp

      Filesize

      44KB

    • memory/2168-1-0x000000007208D000-0x0000000072098000-memory.dmp

      Filesize

      44KB

    • memory/2168-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2168-8-0x0000000001E90000-0x0000000001E92000-memory.dmp

      Filesize

      8KB

    • memory/2312-116-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-113-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-107-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-108-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-109-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-110-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-111-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2312-123-0x0000000004890000-0x00000000048D0000-memory.dmp

      Filesize

      256KB

    • memory/2312-122-0x000000006A450000-0x000000006AB3E000-memory.dmp

      Filesize

      6.9MB

    • memory/2312-121-0x0000000004890000-0x00000000048D0000-memory.dmp

      Filesize

      256KB

    • memory/2312-118-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2312-120-0x000000006A450000-0x000000006AB3E000-memory.dmp

      Filesize

      6.9MB

    • memory/2660-7-0x0000000003670000-0x0000000003672000-memory.dmp

      Filesize

      8KB

    • memory/2660-102-0x000000007208D000-0x0000000072098000-memory.dmp

      Filesize

      44KB

    • memory/2660-3-0x000000002FFB1000-0x000000002FFB2000-memory.dmp

      Filesize

      4KB

    • memory/2660-5-0x000000007208D000-0x0000000072098000-memory.dmp

      Filesize

      44KB