Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2023 15:24

General

  • Target

    PO-0075930-1.xls

  • Size

    1.1MB

  • MD5

    c677f23b98f41ace3e30b3451a29e865

  • SHA1

    c04789e8a9edea9ad9b8694bbc471460ce3d2e8f

  • SHA256

    46cc5500d9579887c1d2694b124d18f2915c0e372bd725aa57a4eb610e02a75a

  • SHA512

    fc2bb50269d62a5d31b82dbbbfbdef9164bbdd14f4406e82ba3238e338a9c306ca1aede8c8e81e0bfb23bd861c2a965ce1e926712d9919bb7f09d36ce0a223b1

  • SSDEEP

    24576:Bw6/4ZyEAXZS8sw6/mZyGAXZSZiGwwcqZUovtJfTJqdLQ33powDXH:66/qKEE6/wEE+CjvjdMLQ33pokX

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO-0075930-1.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1216
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2668
    • C:\Users\Admin\AppData\Roaming\wlanext.exe
      "C:\Users\Admin\AppData\Roaming\wlanext.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2556
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UmViskfCi.exe"
        3⤵
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2924
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UmViskfCi" /XML "C:\Users\Admin\AppData\Local\Temp\tmp92BE.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2608
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        3⤵
        • Executes dropped EXE
        PID:2948
      • C:\Users\Admin\AppData\Roaming\wlanext.exe
        "C:\Users\Admin\AppData\Roaming\wlanext.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\3CDE2480.emf

    Filesize

    1.4MB

    MD5

    1fcb3f34b5588f6a647a06dff1811bf9

    SHA1

    1f5ef0e6e41c14795decedcefc883ab9000fac9a

    SHA256

    a99e8172248dac0b2a6243d06a862901989857b0c2ecbed5f25ddb0d1a95154e

    SHA512

    47e951583afff444f9adb09beab0d83f9792b46d3e1fabf05d21068218d64b3cba48e2dc22fe0a7bd3252a0e0c8866faa244b5dc3784bd336ecbc9f2924fb2aa

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F55AF022.emf

    Filesize

    526KB

    MD5

    a3051cfbb9630c7051a258fdd425031c

    SHA1

    7603f77dfff7673c05a1ee7ee54390ac7475307f

    SHA256

    d98dada00f1a9329257a33f2a9ec603bc7884812f4b65e7c8dec100c0ca393fe

    SHA512

    110bca7c1962c151177c7102311540990f9d9f03952e4a8380b872e0179a9761766ea66a06b3e0dba630133949a5506d3401ddce9b5631910f9c3efa914768d3

  • C:\Users\Admin\AppData\Local\Temp\tmp92BE.tmp

    Filesize

    1KB

    MD5

    84e4ef53511bef097f25b810d39e6106

    SHA1

    f87e124b68674aa583e0a8ec1ee31fe7b6f80972

    SHA256

    d21e0a15313b1d12bb9f7bc1175f1ce57525cebe34c165ea32108c960a9941a2

    SHA512

    c9c3973c546e8348fc72cbf57c55dd1b9c21441b61940f0d9d2b362146b98aacc944cb338169bc3dc0339ef48c37641fa1b8cc3104931d8bdce2b45aa595aa66

  • C:\Users\Admin\AppData\Roaming\wlanext.exe

    Filesize

    614KB

    MD5

    a759e8c16420ac111730b3d85455c256

    SHA1

    884078bf38588730be94b28b8d5c3ada281a301f

    SHA256

    92ebe1666615b108e09981bc054cf76d7f4eeaa44595c813e01d419cd359fa8c

    SHA512

    cff0141b03ea3d995de2820070de6987560428d97b3be587194bf2cc3abf912576aea0a72c635f9784b9ae436ec2334ba63ca9ed2ffef2ae50dfd4cf6a1f9a9a

  • memory/1216-70-0x000000007213D000-0x0000000072148000-memory.dmp

    Filesize

    44KB

  • memory/1216-22-0x000000007213D000-0x0000000072148000-memory.dmp

    Filesize

    44KB

  • memory/1216-1-0x000000007213D000-0x0000000072148000-memory.dmp

    Filesize

    44KB

  • memory/1216-59-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1216-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2556-19-0x00000000046D0000-0x0000000004710000-memory.dmp

    Filesize

    256KB

  • memory/2556-20-0x0000000000520000-0x0000000000538000-memory.dmp

    Filesize

    96KB

  • memory/2556-21-0x0000000000480000-0x0000000000488000-memory.dmp

    Filesize

    32KB

  • memory/2556-23-0x0000000000540000-0x000000000054A000-memory.dmp

    Filesize

    40KB

  • memory/2556-24-0x0000000007870000-0x00000000078EA000-memory.dmp

    Filesize

    488KB

  • memory/2556-18-0x000000006C2B0000-0x000000006C99E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-41-0x000000006C2B0000-0x000000006C99E000-memory.dmp

    Filesize

    6.9MB

  • memory/2556-17-0x0000000000B20000-0x0000000000BC0000-memory.dmp

    Filesize

    640KB

  • memory/2616-37-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-54-0x000000006BA20000-0x000000006C10E000-memory.dmp

    Filesize

    6.9MB

  • memory/2616-40-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-43-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-46-0x000000006BA20000-0x000000006C10E000-memory.dmp

    Filesize

    6.9MB

  • memory/2616-35-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2616-31-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-32-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-50-0x00000000049B0000-0x00000000049F0000-memory.dmp

    Filesize

    256KB

  • memory/2616-33-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2616-34-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2924-47-0x000000006C2B0000-0x000000006C85B000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-53-0x000000006C2B0000-0x000000006C85B000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-51-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB

  • memory/2924-52-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB

  • memory/2924-49-0x000000006C2B0000-0x000000006C85B000-memory.dmp

    Filesize

    5.7MB

  • memory/2924-48-0x00000000028B0000-0x00000000028F0000-memory.dmp

    Filesize

    256KB