Analysis

  • max time kernel
    118s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2023 04:06

General

  • Target

    3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9.docx

  • Size

    16KB

  • MD5

    3271e7b2a99808a2a39538a7f6eb2c7b

  • SHA1

    af893da71b2e896282ba8d02ae62243c7439ecfe

  • SHA256

    3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9

  • SHA512

    595ca5f8c99aa1df20e6e8131e71a30d8d4e7bfef537ad355126bd94966210e35aab13d249c844ddd8f9cd36f2717139a2f95f51b8b0e885081927cbbc57f3da

  • SSDEEP

    384:ByX9Iw6WNs8PL8wi4OEwH8TIbE91r2fRXJYEvifjv2jtt:Bc9c25P3DOqnYJ5dvejv2pt

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    cp5ua.hyperhost.ua
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7213575aceACE@#$

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3bff4f95cc537a4ad075931d288e21a0640a1764a29a40f0b3ea0d89f54635a9.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2368
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Roaming\obiper83027.exe
        "C:\Users\Admin\AppData\Roaming\obiper83027.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Users\Admin\AppData\Roaming\obiper83027.exe
          "C:\Users\Admin\AppData\Roaming\obiper83027.exe"
          3⤵
          • Executes dropped EXE
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:320

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{9A164A5C-6DE8-4A4E-B3A2-F94BAFA71ECA}.FSD

      Filesize

      128KB

      MD5

      9c39a66c8f86093a0f6721f04e8f9f73

      SHA1

      f5ccd5da4c72c28aec4353b1d429c2439bfa4385

      SHA256

      57aa1fcd82fccb2e117d790876ccd4ba24903a320ac847eb45b68dbc0d128398

      SHA512

      60c7dcb1ac63095d9505a58e46f20f81f1af5bca827989b22c21c68ff2c4aa1f5a6d34b66a45540f01c4d2deb8c359373bb3eaf963e4c1b0534fa63dca0028e3

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      33769a6585c44e52f8c8be040a3712dd

      SHA1

      20accf56f9efa8eb0917476f8fa4d2d25b08a02b

      SHA256

      99e315ee1a12b2525cba240cdb39e9047dcd49dfb72c298de23d9ea91e1b8e45

      SHA512

      f0716dd13d6f314affd6cc80cead6a1dd03768872ecaa59cc9c318c8728bdf36a517c5e3385b613978f6e9f46ada4dd60ad7aec29d186314923754b92885f066

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{4A33C0E8-260B-44A7-B770-ABC092DF0CD6}.FSD

      Filesize

      128KB

      MD5

      d8948ed0b2c7f5a2a4b3ac45ff8228ed

      SHA1

      13017f263e6239e092e9f74a90d1483d1748bd82

      SHA256

      61592c5b37b4cfa41722b3c423c00566fb899027d5105613a6fbf211d3c9f778

      SHA512

      fb886031d5082f641f6206e0079098e5f1d9b6703f0fc7f52f52c15a79fef89a2148d702096755bee0ecc5a0ecd33eeeabba5154e230f15ff236c0b99f085462

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HYJJYCDH\obizx[1].doc

      Filesize

      193KB

      MD5

      91dcb6cc7abd7d1fc56b67b167ca0680

      SHA1

      c50d9452b93bc66d13d5dea119c416180f22a3ea

      SHA256

      dbf90e15084a0435f44d21631b48e8c1cddfae971f631cb06647dd6de78873b1

      SHA512

      a23be617a086d2572d5d45153cb14bb8eb3d8728dbc388c5c31e59ce1015d142819866848bd7927a5e903952dad56e40cf3a79c80bbaff2b62e64d7212742fbd

    • C:\Users\Admin\AppData\Local\Temp\TarDDF7.tmp

      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\{BAB369A3-E073-4CEB-A10F-DA718B0D8077}

      Filesize

      128KB

      MD5

      2cc218845fc0fc74295e739c9f4c48f2

      SHA1

      7c93517741ffc7e504df3d565d6377c047a51e8d

      SHA256

      c2e13eee4d420fdb93b58f159c96c302046ca95f16c78ab37bf122ec2347e0be

      SHA512

      a11efe01af012c60ef3594a1b36aea44b311242d704cac422c3ba1a60e50f679b9d6a0502f304d10bce8459bdcefa9a8c525ef1f31ab4d7a13e090728b916716

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      0c00d028ac46c49f23836313f4245baa

      SHA1

      1ec448de1ebe836f2c0be105aa464a76ee3d1109

      SHA256

      96af24bebcdc13480580f69d6d7c3a2a7e9ad3a335db5957dd2c4c9495c32469

      SHA512

      276c2540d8982106b15b04187238a6928541260c373bbdb1dbac649ff49011235d8b406f5070b0e58ca73bd76db647b17a4e03d188a0b4d3d4e72de41142cd9f

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\ExcludeDictionaryEN0409.lex

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • C:\Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • \Users\Admin\AppData\Roaming\obiper83027.exe

      Filesize

      731KB

      MD5

      12f10d15b25ffad6e27f76029516058a

      SHA1

      4d77667087e0560cdf901adce83fd6d34b1b1e55

      SHA256

      d134c531dc1702e7fb2efb1b65146a367b76cd97c78e23492f2a45719bc80a2a

      SHA512

      8e25ad75ff060852072753219ce5d6f359651db1dd60f424901374c7cd31cf34bc204e7a9098954dfccbb86e9dedb286b3a0654f9155f6ba8cf48c7d3bf96b18

    • memory/320-130-0x000000006B1B0000-0x000000006B89E000-memory.dmp

      Filesize

      6.9MB

    • memory/320-123-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/320-171-0x0000000000280000-0x00000000002C0000-memory.dmp

      Filesize

      256KB

    • memory/320-170-0x000000006B1B0000-0x000000006B89E000-memory.dmp

      Filesize

      6.9MB

    • memory/320-131-0x0000000000280000-0x00000000002C0000-memory.dmp

      Filesize

      256KB

    • memory/320-128-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/320-126-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/320-117-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/320-118-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/320-121-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/320-120-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/320-119-0x0000000000400000-0x0000000000444000-memory.dmp

      Filesize

      272KB

    • memory/2820-97-0x000000006B1B0000-0x000000006B89E000-memory.dmp

      Filesize

      6.9MB

    • memory/2820-102-0x0000000004C10000-0x0000000004C50000-memory.dmp

      Filesize

      256KB

    • memory/2820-116-0x0000000005CA0000-0x0000000005D1E000-memory.dmp

      Filesize

      504KB

    • memory/2820-115-0x00000000005E0000-0x00000000005EA000-memory.dmp

      Filesize

      40KB

    • memory/2820-103-0x0000000000470000-0x0000000000488000-memory.dmp

      Filesize

      96KB

    • memory/2820-129-0x000000006B1B0000-0x000000006B89E000-memory.dmp

      Filesize

      6.9MB

    • memory/2820-114-0x0000000000590000-0x0000000000598000-memory.dmp

      Filesize

      32KB

    • memory/2820-96-0x00000000000E0000-0x000000000019C000-memory.dmp

      Filesize

      752KB

    • memory/3064-2-0x000000007177D000-0x0000000071788000-memory.dmp

      Filesize

      44KB

    • memory/3064-113-0x000000007177D000-0x0000000071788000-memory.dmp

      Filesize

      44KB

    • memory/3064-0-0x000000002F141000-0x000000002F142000-memory.dmp

      Filesize

      4KB

    • memory/3064-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3064-195-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/3064-196-0x000000007177D000-0x0000000071788000-memory.dmp

      Filesize

      44KB