Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2023 19:21

General

  • Target

    3eb49f3cd7bdc676ac5b8f46c9ff956717275b7dd7ab90fbea3e3fe3fbaae576xlsx.xls

  • Size

    391KB

  • MD5

    84129445f6446d089445dbe993224dcd

  • SHA1

    7e8ccd59f7484ca6e2701404ff8c77182cba2dce

  • SHA256

    3eb49f3cd7bdc676ac5b8f46c9ff956717275b7dd7ab90fbea3e3fe3fbaae576

  • SHA512

    47ebc4e589bc797896727857c91d6e6f6c3ee99b5e41cae7f4336e1fe643f6da3d436bc5edba234af31e419b82d337e03904b293b36fa3a245b1bd3cf6caadce

  • SSDEEP

    6144:YDn1m9kdbaG3mU+ZKy4ij4a3DjKcUX1edr1aqizRBfqGudZFAW6ffPPXC53EE:YDOeuiqKjij4a3DjM1ehMvmFC3Xq3EE

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.elquijotebanquetes.com
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    kFxADjwNBm$_

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\3eb49f3cd7bdc676ac5b8f46c9ff956717275b7dd7ab90fbea3e3fe3fbaae576xlsx.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2868
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2428
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1968
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:936

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B3A73D94-84E7-4881-B0F6-66A5E1EB5D2F}.FSD

      Filesize

      128KB

      MD5

      2237436db812d32a19e1f7740c36e778

      SHA1

      9c99c4e39b67721f82b74dd2aaa350006a579261

      SHA256

      21f4519f30170f127139082924f355eb7190e901b3061bdede5e03f2bba73510

      SHA512

      6836bfe921fefe99987237f834817efea850f4578ea386c60f4f836df7a82e1c0fb56741a73bb87833d2b5e5b4ef169b06e2d904ae8d75fa3d80616f7a208b48

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      58b14247f0fdf9ac1ebd1abb1803de05

      SHA1

      4f47386fed764f4efa15a0c37d6a90d43becb745

      SHA256

      93acd651eaecf2eb5cd4d060b83195796e45aa8bc3660d9501b1befca040d5f9

      SHA512

      7cc7e42ce50147ab0232b3442a98a7fbc16ac89218aa3c16ce5e014339d3d8457c148a5c4e0f6d199b8b8e28cb6ba1b55d0fa38cc710e749280bdc242545e492

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BOB1G6ZJ\microsoftdetecthistorycachecookieentirethingsfromthepcfordelete[1].doc

      Filesize

      66KB

      MD5

      3257e76f6fd7ccf389feb54fd83653a3

      SHA1

      0f567d839141d2e9b0ed8c7be435ca8eb50c3727

      SHA256

      5d14534b002980d390f30c6b970b17a3b4b6855c817b5703cd9a87291448144d

      SHA512

      226c6eae6d86b07d1bfbaf482c52267b63f423c5fb8474dd3b60978b116ffd90d5f6d5b38291a01afeee1d392c71d79103efd58d8d2e1870dd9c3cdd94d4664c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\32EDD80A.doc

      Filesize

      66KB

      MD5

      3257e76f6fd7ccf389feb54fd83653a3

      SHA1

      0f567d839141d2e9b0ed8c7be435ca8eb50c3727

      SHA256

      5d14534b002980d390f30c6b970b17a3b4b6855c817b5703cd9a87291448144d

      SHA512

      226c6eae6d86b07d1bfbaf482c52267b63f423c5fb8474dd3b60978b116ffd90d5f6d5b38291a01afeee1d392c71d79103efd58d8d2e1870dd9c3cdd94d4664c

    • C:\Users\Admin\AppData\Local\Temp\{D51D7024-4939-4A50-B666-415467DE9715}

      Filesize

      128KB

      MD5

      0de7976015a8bea99192223278b14d07

      SHA1

      3171ed131bf59df591936694a19fb77ac8324954

      SHA256

      72cb0b71af65464f3e93dbf48b074bb54957e1113cb873e829cd5fe3c4b4a256

      SHA512

      3cac7c05db9ead23cc03ed23dcbe27240c08243eb16fc6e4f3d1cfc0fc2ac9e44f8e1c74dee623d94700198ad8f739b0ad2f7f01820dff59c7f7100134e5a800

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      958b3c23acfc888972c012bf252ae0de

      SHA1

      c29d0fa39964d02cb0cd2bc5102f56fb47ebda3e

      SHA256

      8d5198ae291391a57de1d06e02ba02e829508eb4b39ba13afaa1b09cb9f98f10

      SHA512

      711d894c8ae2502dd800e5d0e81f9d47caa8ad7cf0b1fa0800fc366b41909998e21768517e6d1db2212edd1f3ef6512bbfe57245c4ea9dd41e9a97bf7f4a69c6

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      8d48c2313eb76a6246b47b858edc3c1f

      SHA1

      27d7e020e592bbea6d1488e2a3a13e2c3e6815fe

      SHA256

      43c02a6f5ce94d2e919b673d0e5427fce5de8f921a2a627df59d202705ed45cc

      SHA512

      34e112098d437aaf266c048a7441d133d4dc7a2211982c89f6a0f79118e79f101b8c6f3a58e49bb8908c9bf821b486e076a2aae594efe9a8c3e878cb78be9306

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      8d48c2313eb76a6246b47b858edc3c1f

      SHA1

      27d7e020e592bbea6d1488e2a3a13e2c3e6815fe

      SHA256

      43c02a6f5ce94d2e919b673d0e5427fce5de8f921a2a627df59d202705ed45cc

      SHA512

      34e112098d437aaf266c048a7441d133d4dc7a2211982c89f6a0f79118e79f101b8c6f3a58e49bb8908c9bf821b486e076a2aae594efe9a8c3e878cb78be9306

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      8d48c2313eb76a6246b47b858edc3c1f

      SHA1

      27d7e020e592bbea6d1488e2a3a13e2c3e6815fe

      SHA256

      43c02a6f5ce94d2e919b673d0e5427fce5de8f921a2a627df59d202705ed45cc

      SHA512

      34e112098d437aaf266c048a7441d133d4dc7a2211982c89f6a0f79118e79f101b8c6f3a58e49bb8908c9bf821b486e076a2aae594efe9a8c3e878cb78be9306

    • \Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      799KB

      MD5

      8d48c2313eb76a6246b47b858edc3c1f

      SHA1

      27d7e020e592bbea6d1488e2a3a13e2c3e6815fe

      SHA256

      43c02a6f5ce94d2e919b673d0e5427fce5de8f921a2a627df59d202705ed45cc

      SHA512

      34e112098d437aaf266c048a7441d133d4dc7a2211982c89f6a0f79118e79f101b8c6f3a58e49bb8908c9bf821b486e076a2aae594efe9a8c3e878cb78be9306

    • memory/936-107-0x000000006A300000-0x000000006A9EE000-memory.dmp

      Filesize

      6.9MB

    • memory/936-108-0x0000000007240000-0x0000000007280000-memory.dmp

      Filesize

      256KB

    • memory/936-106-0x00000000082C0000-0x0000000008302000-memory.dmp

      Filesize

      264KB

    • memory/936-104-0x0000000000860000-0x000000000086A000-memory.dmp

      Filesize

      40KB

    • memory/936-103-0x0000000000740000-0x0000000000748000-memory.dmp

      Filesize

      32KB

    • memory/936-96-0x0000000000230000-0x00000000002FE000-memory.dmp

      Filesize

      824KB

    • memory/936-98-0x000000006A300000-0x000000006A9EE000-memory.dmp

      Filesize

      6.9MB

    • memory/936-99-0x0000000007240000-0x0000000007280000-memory.dmp

      Filesize

      256KB

    • memory/936-100-0x0000000000570000-0x000000000058A000-memory.dmp

      Filesize

      104KB

    • memory/936-105-0x0000000008240000-0x00000000082BC000-memory.dmp

      Filesize

      496KB

    • memory/2728-5-0x0000000071FED000-0x0000000071FF8000-memory.dmp

      Filesize

      44KB

    • memory/2728-3-0x000000002F471000-0x000000002F472000-memory.dmp

      Filesize

      4KB

    • memory/2728-102-0x0000000071FED000-0x0000000071FF8000-memory.dmp

      Filesize

      44KB

    • memory/2728-7-0x0000000002EC0000-0x0000000002EC2000-memory.dmp

      Filesize

      8KB

    • memory/2728-130-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2728-131-0x0000000071FED000-0x0000000071FF8000-memory.dmp

      Filesize

      44KB

    • memory/2868-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2868-101-0x0000000071FED000-0x0000000071FF8000-memory.dmp

      Filesize

      44KB

    • memory/2868-8-0x0000000002E00000-0x0000000002E02000-memory.dmp

      Filesize

      8KB

    • memory/2868-1-0x0000000071FED000-0x0000000071FF8000-memory.dmp

      Filesize

      44KB

    • memory/2868-135-0x0000000071FED000-0x0000000071FF8000-memory.dmp

      Filesize

      44KB