Analysis

  • max time kernel
    121s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2023 02:07

General

  • Target

    obizx.rtf

  • Size

    193KB

  • MD5

    91dcb6cc7abd7d1fc56b67b167ca0680

  • SHA1

    c50d9452b93bc66d13d5dea119c416180f22a3ea

  • SHA256

    dbf90e15084a0435f44d21631b48e8c1cddfae971f631cb06647dd6de78873b1

  • SHA512

    a23be617a086d2572d5d45153cb14bb8eb3d8728dbc388c5c31e59ce1015d142819866848bd7927a5e903952dad56e40cf3a79c80bbaff2b62e64d7212742fbd

  • SSDEEP

    768:KwAbZSibMX9gRWjtwAbZSibMX9gRWjGfkiHw5A/Qok5:KwAlRkwAlRHflw5A/s

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\obizx.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2364
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2416
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2628
      • C:\Users\Admin\AppData\Roaming\obiper83027.exe
        "C:\Users\Admin\AppData\Roaming\obiper83027.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Users\Admin\AppData\Roaming\obiper83027.exe
          "C:\Users\Admin\AppData\Roaming\obiper83027.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2188

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\TarC75C.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      d10221cf3faf02fa7b3142512e732076

      SHA1

      58cb730703daa52e7151e1c99d5867f18b6bef73

      SHA256

      32c15f29e657e17701083e54e6826eb90307ba705d3bb894c62fac654aa492ae

      SHA512

      ff95501fd9c502c59958a0240805f72113fbbfed055b0e241e268bf7e360baf8bba6681fa736c5b9111d033502c8395ea5d8cc6dd078af6beef9a7252dfc7093

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • \Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • memory/2188-39-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-33-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-81-0x0000000000A70000-0x0000000000AB0000-memory.dmp

      Filesize

      256KB

    • memory/2188-80-0x000000006AD00000-0x000000006B3EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2188-41-0x0000000000A70000-0x0000000000AB0000-memory.dmp

      Filesize

      256KB

    • memory/2188-40-0x000000006AD00000-0x000000006B3EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2188-36-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-27-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-28-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-29-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-30-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2188-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2364-2-0x00000000711BD000-0x00000000711C8000-memory.dmp

      Filesize

      44KB

    • memory/2364-100-0x00000000711BD000-0x00000000711C8000-memory.dmp

      Filesize

      44KB

    • memory/2364-99-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2364-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2364-0-0x000000002F2F1000-0x000000002F2F2000-memory.dmp

      Filesize

      4KB

    • memory/2364-23-0x00000000711BD000-0x00000000711C8000-memory.dmp

      Filesize

      44KB

    • memory/2908-38-0x000000006ABA0000-0x000000006B28E000-memory.dmp

      Filesize

      6.9MB

    • memory/2908-15-0x0000000000FB0000-0x000000000106C000-memory.dmp

      Filesize

      752KB

    • memory/2908-24-0x0000000000970000-0x0000000000978000-memory.dmp

      Filesize

      32KB

    • memory/2908-25-0x0000000000980000-0x000000000098A000-memory.dmp

      Filesize

      40KB

    • memory/2908-22-0x0000000000950000-0x0000000000968000-memory.dmp

      Filesize

      96KB

    • memory/2908-16-0x000000006ABA0000-0x000000006B28E000-memory.dmp

      Filesize

      6.9MB

    • memory/2908-26-0x0000000005070000-0x00000000050EE000-memory.dmp

      Filesize

      504KB

    • memory/2908-21-0x0000000000770000-0x00000000007B0000-memory.dmp

      Filesize

      256KB