Analysis

  • max time kernel
    144s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20231130-en
  • resource tags

    arch:x64arch:x86image:win7-20231130-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2023 17:09

General

  • Target

    24c228df7c2e025c2db64ebdc6d5824425f3179f228145866bd55700cf7e05ac.xls

  • Size

    392KB

  • MD5

    1cd369286752c3d016b8ce3d59f43e66

  • SHA1

    ee6222b823a92cae26f04351509a1254556508c0

  • SHA256

    24c228df7c2e025c2db64ebdc6d5824425f3179f228145866bd55700cf7e05ac

  • SHA512

    9e875bf7a628faa32846a68d0f699601c31ac8fd66d906d8ba72b70d56ef4d376cb569c0afca1e5ba7eb8972df318d17cbb6393105a4e0c965d356350862b7b2

  • SSDEEP

    6144:un1m9kdb/Gt8b++UXaBkMOQGeg20HYacK4vPLJJhZrRIh1EBb:uOeLlS5aave4HtcK8A/EB

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6670271579:AAHln7Op0JjSMa92pjMiSLRC0uIRAw3DqMQ/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\24c228df7c2e025c2db64ebdc6d5824425f3179f228145866bd55700cf7e05ac.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1820
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2992
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1524
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1832
        • C:\Users\Admin\AppData\Roaming\wlanext.exe
          "C:\Users\Admin\AppData\Roaming\wlanext.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{89533E10-54A4-4477-AF9F-ACC421FE008B}.FSD

      Filesize

      128KB

      MD5

      61e0422939c62d38635012e14b97f382

      SHA1

      12df73aa9d8521bd1b83218a02f5c896d0b47a33

      SHA256

      432df6eaa0b4119e1dd6f6bce7692fe5a07636b60f1c7e74365ab5280109717e

      SHA512

      063883f66d6f8df57874dba795174a8d20104aae46c8878fe40e6ffe390c9bd5384155c72c52335677aeb968bba9efb5f539087e1a7ccbddee00126fedb2d021

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      f41a2f449902725a3a48bc10e71be609

      SHA1

      0348a133421060433d8a86a9981809d20fdbf781

      SHA256

      a94acd10099004225b2dcc254343a5919a578336fe983a0ae75f972bb867e0ca

      SHA512

      c8abe8959bc1fc0766629bc15e0cf51cf06addba0c58de202fd0658af40de19fbfc7604b75e1e8c0c74083330540171b0017a1c881112fde36cc24ed5bccb7b7

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{09F9C9F6-251A-4CB8-9EEC-15483FBFD3EC}.FSD

      Filesize

      128KB

      MD5

      e88e1a2841bb47fa969b31bff4b5fb9d

      SHA1

      75c9f4e861a1a9c67dd030db9a89755b81795e1e

      SHA256

      4ac028c98ffea5f168f5f0cd2ac3ab1e20954e43cd4589279bdbce5e89f375a9

      SHA512

      8620a84ecbba91b376b2a0a04d7436b7f6599dae22fd11e30b0182dd4c443d265e99b62c5a4abd23fdab40c3bd2bb698366041b70069f4e754f237fc97e013db

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\91FD33MK\microsofdecidedtodeleteentirehistorycookiecachefrommypc[1].doc

      Filesize

      50KB

      MD5

      5451b82c9d7e98c077b8dc1f667f5b19

      SHA1

      5788704528823c1988964a8af9c2056dd42f787b

      SHA256

      1e4cba11fed2e6d17ef029301ae806af502cf79109dd9e70ec220d2d4b497a75

      SHA512

      5e5d5ee9eeaccf07cd2d4662fc1ede32231c04f27bbb66ece835b4c3c5fa18a022a636f6d290ebe613453c6388f53b17ce319b6757288148257c85ad161daeed

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\BED5CF1E.doc

      Filesize

      50KB

      MD5

      5451b82c9d7e98c077b8dc1f667f5b19

      SHA1

      5788704528823c1988964a8af9c2056dd42f787b

      SHA256

      1e4cba11fed2e6d17ef029301ae806af502cf79109dd9e70ec220d2d4b497a75

      SHA512

      5e5d5ee9eeaccf07cd2d4662fc1ede32231c04f27bbb66ece835b4c3c5fa18a022a636f6d290ebe613453c6388f53b17ce319b6757288148257c85ad161daeed

    • C:\Users\Admin\AppData\Local\Temp\{9F23AC5F-C748-4609-914F-1BD19A186F43}

      Filesize

      128KB

      MD5

      57cb8ab7d06d5bdf70fa37a089c14843

      SHA1

      b53aca2ceea6c402d2cd419f91b20e87e454c0c3

      SHA256

      df1bb22484243103082d8d6b38b9ce005a8d73f188eaca87ea47e58371e1ed50

      SHA512

      332c488105f980640e038e16f82ed46ab1995dd00e992e676c9688d86eeca2db60ebd396e495939318d82378bccc3d64c02b3a2f8970b41dd3bbf211ac5e08da

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      b488be4699206f2c9c43c007f190816f

      SHA1

      ff4b89f08a7c8ce0a87e504719389c0e8278675e

      SHA256

      d51abb49a25ea3dafda19148108c3326fc41fa2a1dff88aed615fa9027b2b972

      SHA512

      d152bd6cf2eb514bc3faf83219e719283ef98b99d3c0648a79bac588869e7254c3dc697829d8a996690ac3421058f423bde7560cd254effe393ff944f62a5ee7

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      b488be4699206f2c9c43c007f190816f

      SHA1

      ff4b89f08a7c8ce0a87e504719389c0e8278675e

      SHA256

      d51abb49a25ea3dafda19148108c3326fc41fa2a1dff88aed615fa9027b2b972

      SHA512

      d152bd6cf2eb514bc3faf83219e719283ef98b99d3c0648a79bac588869e7254c3dc697829d8a996690ac3421058f423bde7560cd254effe393ff944f62a5ee7

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      b488be4699206f2c9c43c007f190816f

      SHA1

      ff4b89f08a7c8ce0a87e504719389c0e8278675e

      SHA256

      d51abb49a25ea3dafda19148108c3326fc41fa2a1dff88aed615fa9027b2b972

      SHA512

      d152bd6cf2eb514bc3faf83219e719283ef98b99d3c0648a79bac588869e7254c3dc697829d8a996690ac3421058f423bde7560cd254effe393ff944f62a5ee7

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      b488be4699206f2c9c43c007f190816f

      SHA1

      ff4b89f08a7c8ce0a87e504719389c0e8278675e

      SHA256

      d51abb49a25ea3dafda19148108c3326fc41fa2a1dff88aed615fa9027b2b972

      SHA512

      d152bd6cf2eb514bc3faf83219e719283ef98b99d3c0648a79bac588869e7254c3dc697829d8a996690ac3421058f423bde7560cd254effe393ff944f62a5ee7

    • \Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      b488be4699206f2c9c43c007f190816f

      SHA1

      ff4b89f08a7c8ce0a87e504719389c0e8278675e

      SHA256

      d51abb49a25ea3dafda19148108c3326fc41fa2a1dff88aed615fa9027b2b972

      SHA512

      d152bd6cf2eb514bc3faf83219e719283ef98b99d3c0648a79bac588869e7254c3dc697829d8a996690ac3421058f423bde7560cd254effe393ff944f62a5ee7

    • memory/540-120-0x0000000069FF0000-0x000000006A6DE000-memory.dmp

      Filesize

      6.9MB

    • memory/540-113-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/540-123-0x0000000000CA0000-0x0000000000CE0000-memory.dmp

      Filesize

      256KB

    • memory/540-122-0x0000000069FF0000-0x000000006A6DE000-memory.dmp

      Filesize

      6.9MB

    • memory/540-108-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/540-109-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/540-110-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/540-118-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/540-111-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/540-116-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/540-121-0x0000000000CA0000-0x0000000000CE0000-memory.dmp

      Filesize

      256KB

    • memory/1820-1-0x00000000722DD000-0x00000000722E8000-memory.dmp

      Filesize

      44KB

    • memory/1820-101-0x00000000722DD000-0x00000000722E8000-memory.dmp

      Filesize

      44KB

    • memory/1820-8-0x0000000000620000-0x0000000000622000-memory.dmp

      Filesize

      8KB

    • memory/1820-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1832-99-0x0000000000480000-0x00000000004C0000-memory.dmp

      Filesize

      256KB

    • memory/1832-106-0x0000000069FF0000-0x000000006A6DE000-memory.dmp

      Filesize

      6.9MB

    • memory/1832-119-0x0000000069FF0000-0x000000006A6DE000-memory.dmp

      Filesize

      6.9MB

    • memory/1832-105-0x00000000052F0000-0x000000000536A000-memory.dmp

      Filesize

      488KB

    • memory/1832-103-0x0000000000550000-0x000000000055A000-memory.dmp

      Filesize

      40KB

    • memory/1832-102-0x00000000004D0000-0x00000000004D8000-memory.dmp

      Filesize

      32KB

    • memory/1832-100-0x0000000000520000-0x0000000000538000-memory.dmp

      Filesize

      96KB

    • memory/1832-97-0x0000000069FF0000-0x000000006A6DE000-memory.dmp

      Filesize

      6.9MB

    • memory/1832-91-0x0000000000FD0000-0x000000000109E000-memory.dmp

      Filesize

      824KB

    • memory/2992-104-0x00000000722DD000-0x00000000722E8000-memory.dmp

      Filesize

      44KB

    • memory/2992-3-0x000000002F221000-0x000000002F222000-memory.dmp

      Filesize

      4KB

    • memory/2992-5-0x00000000722DD000-0x00000000722E8000-memory.dmp

      Filesize

      44KB

    • memory/2992-7-0x0000000003700000-0x0000000003702000-memory.dmp

      Filesize

      8KB