Analysis

  • max time kernel
    133s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2023 20:22

General

  • Target

    Package.xls

  • Size

    391KB

  • MD5

    3e33c8cf5b3ce2fa86f1b0ab22d2d3c2

  • SHA1

    de4c28fc5c4eab8c71b09830ff295b901be6a844

  • SHA256

    7712b3d4b61189ccbafdbcc285b7a761d517bb68295626e30c33c24c38fb95cd

  • SHA512

    0ef6016a7e6d0a45d9358ee21ddacea1b0aa393f276dadc32f3218c89f41fbea9ac765b5127c60cc8c069eb26ee52ffb740d0a7eb2af6ccf20a68e7740852354

  • SSDEEP

    6144:ln1m9kdbQS6vsB3qfLWnNnBkbE9UX3yhnpC3quvmb6SrnV3LYpMMAI:lOeuvsB351Bkr3yh9b9hr

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.experthvac.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    -8{jszMOY*Z8(~Za0#jyP%o7VoB.0)kk^)7_

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Package.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2584
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1824
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          3⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious use of AdjustPrivilegeToken
          • outlook_office_path
          • outlook_win_path
          PID:992

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      0bc7674b376d4501ba759dbbeb7c152f

      SHA1

      4a65fd14862564b03cf56033212ddca441ab9213

      SHA256

      a795087afb669a478b53fc002089ae002903175e1375e81cda20729eda3e8683

      SHA512

      162ab5f0a0fe3161c874d5fe79db2471233e2527d6337692d083b0ce8d54722cd8682aba5ceba192df8542a7a75905555bd9850133b4b873081fe829222483b1

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{170D0E38-F5F1-4499-BECC-1ED7FBB97F40}.FSD

      Filesize

      128KB

      MD5

      7936d6131debc2700be5d7eb59eccb49

      SHA1

      6c49d82bc8355d48f9c5f70d9396f6c23b90f62e

      SHA256

      7a02af95b0d20f57126e10411f268be2c62162374d8d222a72d711716d9934c0

      SHA512

      bf064b271842cbd039e4db5be15a4476990a023ac6b403c705ed94a5188e40b9498cfab8ef95e41958d2a88fa62c5a2020693d0d380923885659865a06ea56d9

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      dd5443e3e394508bbe64175b298e2ede

      SHA1

      9d5e72c40d601bffdb667f3138d245864241fe9e

      SHA256

      285eaf838247b0cfc8eb78e6a94042d4ee8753bf789e72658bd71c2697ee68a7

      SHA512

      1389c3829c09f9b69ad5d170c778d2f4b90a16dce059e0263d21c649ced8d526ac6bbe68ba1af79cb48e5725c4f7271400342aa70b948d13722edd72411fe950

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{53DA07FA-726C-4EFC-BD68-C58EDAD89A7A}.FSD

      Filesize

      128KB

      MD5

      f825558cf1ee95a61ece5c27d730ffb6

      SHA1

      ba6d4e9772a2596de364c617e64f4714f3a62515

      SHA256

      eabb71dd6d0bfd90f1e642f71b68537a2e68fc6a7d3dc0f92614efb6a185a11a

      SHA512

      59f31b48004ce5bc7667c96b3d7af6b7331c4842b6258b9e59ba082f59bb0d7232dd632978b72cb2e3835d6da8a42301d96a71c339467b7fb937825764d29de8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\2WGHIKMU\microsofttoldemetheywanttodeletehistorycatchcookiefrommypc[1].doc

      Filesize

      48KB

      MD5

      08568b90661f80313579e0c16c2737f0

      SHA1

      859aa8a945a3585bf777ef29bbfeaeba8bc22526

      SHA256

      0bad6a3f47fd9b9063f5c71609e68bd2de6f9d6e4cf1a183351ee8f2f7ebf32b

      SHA512

      f46cf40ef8199cfe58ebd0bc63a09aa70c4c6d6bda1a55bd0d3ef63e26ea3580c63d963d8d4c9af28981ce369edd62a88779dad1bd0f4192115e6f534cb625d8

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\C21091A8.doc

      Filesize

      48KB

      MD5

      08568b90661f80313579e0c16c2737f0

      SHA1

      859aa8a945a3585bf777ef29bbfeaeba8bc22526

      SHA256

      0bad6a3f47fd9b9063f5c71609e68bd2de6f9d6e4cf1a183351ee8f2f7ebf32b

      SHA512

      f46cf40ef8199cfe58ebd0bc63a09aa70c4c6d6bda1a55bd0d3ef63e26ea3580c63d963d8d4c9af28981ce369edd62a88779dad1bd0f4192115e6f534cb625d8

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      823KB

      MD5

      3713c253ab56bf85aaa806fc41cc6905

      SHA1

      cf59aac87590bb5f3bba092f20455b097a1ffab5

      SHA256

      ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

      SHA512

      ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      823KB

      MD5

      3713c253ab56bf85aaa806fc41cc6905

      SHA1

      cf59aac87590bb5f3bba092f20455b097a1ffab5

      SHA256

      ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

      SHA512

      ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

    • C:\Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      823KB

      MD5

      3713c253ab56bf85aaa806fc41cc6905

      SHA1

      cf59aac87590bb5f3bba092f20455b097a1ffab5

      SHA256

      ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

      SHA512

      ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

    • \Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      823KB

      MD5

      3713c253ab56bf85aaa806fc41cc6905

      SHA1

      cf59aac87590bb5f3bba092f20455b097a1ffab5

      SHA256

      ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

      SHA512

      ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

    • \Users\Admin\AppData\Roaming\wlanext.exe

      Filesize

      823KB

      MD5

      3713c253ab56bf85aaa806fc41cc6905

      SHA1

      cf59aac87590bb5f3bba092f20455b097a1ffab5

      SHA256

      ae52ee94e65fb54e279703124ab5ee6191f655f61c5302c49e4cd862cfd1dc17

      SHA512

      ca02a48ec0ff561e50817d661830cd4c4cf39fdc9e458a8fc93170d0fbafc6d1c5f6903a888b95c313e639c74e1e2c2369486873a14fcfbafaa58c7313230f87

    • memory/992-117-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/992-119-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/992-122-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/992-124-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/992-127-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/992-111-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/992-115-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/992-113-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/1564-100-0x000000006A890000-0x000000006AF7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1564-101-0x0000000004630000-0x0000000004670000-memory.dmp

      Filesize

      256KB

    • memory/1564-126-0x000000006A890000-0x000000006AF7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1564-121-0x0000000004630000-0x0000000004670000-memory.dmp

      Filesize

      256KB

    • memory/1564-106-0x000000006A890000-0x000000006AF7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1564-107-0x0000000004630000-0x0000000004670000-memory.dmp

      Filesize

      256KB

    • memory/1564-108-0x0000000004630000-0x0000000004670000-memory.dmp

      Filesize

      256KB

    • memory/1564-109-0x0000000000600000-0x000000000061A000-memory.dmp

      Filesize

      104KB

    • memory/1564-110-0x00000000005B0000-0x00000000005B6000-memory.dmp

      Filesize

      24KB

    • memory/1564-102-0x00000000052A0000-0x00000000052E4000-memory.dmp

      Filesize

      272KB

    • memory/1564-94-0x0000000000B40000-0x0000000000C14000-memory.dmp

      Filesize

      848KB

    • memory/2584-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2584-8-0x00000000023F0000-0x00000000023F2000-memory.dmp

      Filesize

      8KB

    • memory/2584-103-0x0000000072A1D000-0x0000000072A28000-memory.dmp

      Filesize

      44KB

    • memory/2584-1-0x0000000072A1D000-0x0000000072A28000-memory.dmp

      Filesize

      44KB

    • memory/2752-7-0x0000000003680000-0x0000000003682000-memory.dmp

      Filesize

      8KB

    • memory/2752-105-0x0000000072A1D000-0x0000000072A28000-memory.dmp

      Filesize

      44KB

    • memory/2752-5-0x0000000072A1D000-0x0000000072A28000-memory.dmp

      Filesize

      44KB

    • memory/2752-3-0x000000002F0B1000-0x000000002F0B2000-memory.dmp

      Filesize

      4KB