Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 10:43
Static task
static1
Behavioral task
behavioral1
Sample
Enq.xll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Enq.xll
Resource
win10v2004-20240226-en
General
-
Target
Enq.xll
-
Size
643KB
-
MD5
0ed458621a0e75e9dac09b9cf00b909d
-
SHA1
02f07b3badc63785cd66b181657322f851d3b0c2
-
SHA256
7a6f8590d4be989faccb34cd393e713fd80fa17e92d7613f33061d647d0e6d12
-
SHA512
2cb0a297922a609ccbebe3bd64ba8aa7560e2440753c0c39da545cb78248050d1bb0b98b92dd9e013ead850a7087882296bb464e7f639e8c5456b0955f9f9ac9
-
SSDEEP
12288:pn/zDvGHAykHSzLW/4+8bzbBSreMdbhgFK/UqWgmrMqir:NzbGHAzHAjX1CcLgYi
Malware Config
Extracted
agenttesla
Protocol: smtp- Port:
587 - Username:
yg�wt%�HIDHd�@CFHn�FE\s�Y^UK.�SP[ - Password:
9�TU������
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 3 IoCs
resource yara_rule behavioral2/memory/324-41-0x000001B79D460000-0x000001B79D49E000-memory.dmp family_agenttesla behavioral2/files/0x0007000000023297-47.dat family_agenttesla behavioral2/memory/4384-57-0x0000000000C90000-0x0000000000CCC000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 4384 service.exe -
Loads dropped DLL 2 IoCs
pid Process 324 EXCEL.EXE 324 EXCEL.EXE -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 service.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 service.exe Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 service.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 324 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4384 service.exe 4384 service.exe 4384 service.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4384 service.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 324 EXCEL.EXE 324 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 324 EXCEL.EXE 324 EXCEL.EXE 324 EXCEL.EXE 324 EXCEL.EXE 324 EXCEL.EXE 324 EXCEL.EXE 324 EXCEL.EXE 324 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 324 wrote to memory of 4384 324 EXCEL.EXE 100 PID 324 wrote to memory of 4384 324 EXCEL.EXE 100 PID 324 wrote to memory of 4384 324 EXCEL.EXE 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 service.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 service.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Enq.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5240 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5e69b554e1fa16a09cb7f306b40248939
SHA15f1546807bad5d8b34f57c431592d9882a5edcd5
SHA256edc132613d495c261e850a336ed2dc34913564f7e2f71c3a597b367853ea1ece
SHA5124022ec6ec39c7f15b86fdf4d8047a26f40ba42718a1dc1d88f4c9959b7f4fa6f852005c3137def3aa4cba31923372a1a303940be58cd6f6989f79d01666e2d6f
-
Filesize
81KB
MD555578414c0cc5a11038ed54831299c42
SHA131b7a4c9afb775c5ce6c882f7debf199d798438b
SHA25694f2027fef4d459a1b46ad248cb4d48af7f0943bf0cfa58d13c62c670443d4c7
SHA512cb50e0d8006a58e3b5f803e5f850df4c5b16ff8b5e8ad282896dcad8845467d19b69dc0c41c229b681adb91cfae78f55309c06d93e4a2c166f584cd8d6e72898
-
Filesize
216KB
MD559b496a8ac6c38dad931d4bfb071e74b
SHA18444c61041b3b2844aac3c5477929f2723859eb0
SHA256ab5444f001b8f9e06ebf12bc8fdc200ee5f4185ee52666d69f7d996317ea38f3
SHA5125a1dae0a3a84a677a71b43ac2e423983078945a962a34c4ec735cadc86a0a966762c65c701f6efbda4a21f358004d63063ca93ff4881e79d0599334f160a41de