Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231025-en
  • resource tags

    arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2023 15:14

General

  • Target

    PO-0075930-1.xls

  • Size

    1.1MB

  • MD5

    c677f23b98f41ace3e30b3451a29e865

  • SHA1

    c04789e8a9edea9ad9b8694bbc471460ce3d2e8f

  • SHA256

    46cc5500d9579887c1d2694b124d18f2915c0e372bd725aa57a4eb610e02a75a

  • SHA512

    fc2bb50269d62a5d31b82dbbbfbdef9164bbdd14f4406e82ba3238e338a9c306ca1aede8c8e81e0bfb23bd861c2a965ce1e926712d9919bb7f09d36ce0a223b1

  • SSDEEP

    24576:Bw6/4ZyEAXZS8sw6/mZyGAXZSZiGwwcqZUovtJfTJqdLQ33powDXH:66/qKEE6/wEE+CjvjdMLQ33pokX

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO-0075930-1.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:816
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Users\Admin\AppData\Roaming\wlanext.exe
      "C:\Users\Admin\AppData\Roaming\wlanext.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UmViskfCi.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2572
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmViskfCi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9B46.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2808
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\5BF94E8B.emf

    Filesize

    1.4MB

    MD5

    1fcb3f34b5588f6a647a06dff1811bf9

    SHA1

    1f5ef0e6e41c14795decedcefc883ab9000fac9a

    SHA256

    a99e8172248dac0b2a6243d06a862901989857b0c2ecbed5f25ddb0d1a95154e

    SHA512

    47e951583afff444f9adb09beab0d83f9792b46d3e1fabf05d21068218d64b3cba48e2dc22fe0a7bd3252a0e0c8866faa244b5dc3784bd336ecbc9f2924fb2aa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E1955DB5.emf

    Filesize

    526KB

    MD5

    a3051cfbb9630c7051a258fdd425031c

    SHA1

    7603f77dfff7673c05a1ee7ee54390ac7475307f

    SHA256

    d98dada00f1a9329257a33f2a9ec603bc7884812f4b65e7c8dec100c0ca393fe

    SHA512

    110bca7c1962c151177c7102311540990f9d9f03952e4a8380b872e0179a9761766ea66a06b3e0dba630133949a5506d3401ddce9b5631910f9c3efa914768d3

  • C:\Users\Admin\AppData\Local\Temp\tmp9B46.tmp

    Filesize

    1KB

    MD5

    2f4d35bd41180a8cd53467910fc627b5

    SHA1

    a22e824b672fa69af2ce7798d701b09b4574d996

    SHA256

    d7482950901ef37f86a93b5fdaef8543ab1213c19bb9dab9aa2d81cc437ff4eb

    SHA512

    02cd6a49c0e694b9fce81042381e614b3c034b335a1408d90d907aa4239ac5458d9a01b0a9a2c6f168b144b7092a6148171fbfb4aedbf3cb11aca6b9df031e0f

  • C:\Users\Admin\AppData\Roaming\wlanext.exe

    Filesize

    614KB

    MD5

    a759e8c16420ac111730b3d85455c256

    SHA1

    884078bf38588730be94b28b8d5c3ada281a301f

    SHA256

    92ebe1666615b108e09981bc054cf76d7f4eeaa44595c813e01d419cd359fa8c

    SHA512

    cff0141b03ea3d995de2820070de6987560428d97b3be587194bf2cc3abf912576aea0a72c635f9784b9ae436ec2334ba63ca9ed2ffef2ae50dfd4cf6a1f9a9a

  • C:\Users\Admin\AppData\Roaming\wlanext.exe

    Filesize

    385KB

    MD5

    e50ed95ee0d7eb0d207d128879394351

    SHA1

    367ba3ba818d2a7eac4d3f14706bc54378691631

    SHA256

    12272f0100405f060dbf2abd579d1347c06d5d3ad7834ca537911dae7aad8c5a

    SHA512

    c40045e94334638e72c9d8eceb63e9f78e2c745b5543d44044c5436db0e4d5136f01472ac932765cf7b3b7bdb06767a0bf45f9bb8cce2cd0b4f52bfb78f2a870

  • memory/816-23-0x00000000722BD000-0x00000000722C8000-memory.dmp

    Filesize

    44KB

  • memory/816-1-0x00000000722BD000-0x00000000722C8000-memory.dmp

    Filesize

    44KB

  • memory/816-73-0x00000000722BD000-0x00000000722C8000-memory.dmp

    Filesize

    44KB

  • memory/816-62-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/816-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2540-51-0x000000006B1C0000-0x000000006B8AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2540-56-0x000000006B1C0000-0x000000006B8AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2540-57-0x00000000007B0000-0x00000000007F0000-memory.dmp

    Filesize

    256KB

  • memory/2540-32-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2540-34-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2540-36-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2540-38-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2540-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2540-42-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2540-45-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2540-52-0x00000000007B0000-0x00000000007F0000-memory.dmp

    Filesize

    256KB

  • memory/2540-48-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2572-55-0x0000000066780000-0x0000000066D2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2572-50-0x0000000066780000-0x0000000066D2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2572-53-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2572-54-0x0000000002770000-0x00000000027B0000-memory.dmp

    Filesize

    256KB

  • memory/2572-49-0x0000000066780000-0x0000000066D2B000-memory.dmp

    Filesize

    5.7MB

  • memory/2636-21-0x0000000000320000-0x0000000000328000-memory.dmp

    Filesize

    32KB

  • memory/2636-46-0x000000006C410000-0x000000006CAFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2636-24-0x0000000005070000-0x00000000050EA000-memory.dmp

    Filesize

    488KB

  • memory/2636-22-0x0000000000370000-0x000000000037A000-memory.dmp

    Filesize

    40KB

  • memory/2636-20-0x0000000000350000-0x0000000000368000-memory.dmp

    Filesize

    96KB

  • memory/2636-19-0x0000000004E90000-0x0000000004ED0000-memory.dmp

    Filesize

    256KB

  • memory/2636-18-0x000000006C410000-0x000000006CAFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2636-17-0x0000000001290000-0x0000000001330000-memory.dmp

    Filesize

    640KB