Analysis

  • max time kernel
    148s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14/03/2024, 12:38

General

  • Target

    smtp12_0_BANK DETAILS.xls

  • Size

    317KB

  • MD5

    ec47b9bbe25cfe2c665dc5b052da8f54

  • SHA1

    2ad3a85770f659e0b30609ccaa0619d2e8c31cde

  • SHA256

    ebbb1734bf79d2057410762e5674ea2630f80c6700c660c6f54b4e9d8e48d332

  • SHA512

    d9c1bfc2af6e2263643675b559283fa207b5e104b43375bddc0487c7789a25b9ff857da90c42c75efa6c2bf07f09a1b0f009264f4b7f3600d0e579fb2fbc1586

  • SSDEEP

    6144:2qunJPRvY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbV6nMIENQBdMgxK5tMZf6:2bJPRy3bV6nMIEN2lxK5WZB3Bk

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\smtp12_0_BANK DETAILS.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1464
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1836
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2396
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:3060
      • C:\Users\Admin\AppData\Roaming\CNN.exe
        "C:\Users\Admin\AppData\Roaming\CNN.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Users\Admin\AppData\Roaming\CNN.exe
          "C:\Users\Admin\AppData\Roaming\CNN.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2848

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

            Filesize

            67KB

            MD5

            753df6889fd7410a2e9fe333da83a429

            SHA1

            3c425f16e8267186061dd48ac1c77c122962456e

            SHA256

            b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78

            SHA512

            9d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            344B

            MD5

            4a7755eed2eb22215f16defe44c3d5ec

            SHA1

            0360ef1ed4f2cde01c10299be4d8e8ffc21852a6

            SHA256

            5b707bffc282b8939f4cec5aa3161346ade5c6df6f7e054c2c29913c0c7ef426

            SHA512

            519f3534a9a368f171cc871630ffb6b24328cd13676f9e96690009ae21ca3bc243ee0133500eccf616eebc6d911cf624a7e7d58e6c58aabf6b7dd2d2c93bfae7

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            970dd8367efa3308604fa563ba0ca8b9

            SHA1

            0d68faddf0155028bdb1d3cd3beafd472314a498

            SHA256

            7cc58beacf897bcaee1d5cc320f53ae23b09396ea1c9eea0fdec4ac1fd22a9f9

            SHA512

            ff4751885dfaaa6ca74500f52f5df9e07352aeebdfc107220385e115c41171c3c59a9e05d9e721bc8733c61f9ea1d07b2dd8d05c5329f1af33c5941d66d0eb84

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{04A849DA-4AE6-439F-92C1-530A286FB613}.FSD

            Filesize

            128KB

            MD5

            6bedb98b21bde71bcf00b16937fdb58d

            SHA1

            ea501b7b4a295ac838d719d28f5bd89f376cebd3

            SHA256

            6c71280f513ea2af5e62ffb30ba02af4f0ed94cae98f05f084090cd3e2eb18af

            SHA512

            b96c964193453d8ea67073e4611c5aad0ebb13c8802d6dde95f4481a98224ba30ca06243f5e2fe246e1a6a347684cc6f0b15d9c550419f50acb989a3d40a76c8

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

            Filesize

            128KB

            MD5

            f1c869c7e686b519e35eb555099871ee

            SHA1

            c3ea0d8d054450a3426601a6a9f6e5e18e1fa129

            SHA256

            f4feed9ac8b1550190d91fa9465c0f483c027547df5fdca865d3a0d5b253185b

            SHA512

            469b9f5e1a45abffef40ddca8c8ea71228802d4cb0e17c7b1697d20fe60f212aed4dc63d2aa058c7b2ff4e4cd746b44938db05bbebd23e5c79f89f5cc79c2897

          • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{39232D1D-18DF-4C5B-ADA6-EE47E18A2CD0}.FSD

            Filesize

            128KB

            MD5

            623292af11ad75ab988a8e30a087a19c

            SHA1

            3a2ff6116313c6c2c0fc1268ebdd931c79ccf636

            SHA256

            a63e5042eef6ff937c5f62e6ca3d727c39f93ff27691e2c8810d1cc091824d18

            SHA512

            9b080cd1868e8572ce658d9ea4e45d1e52d71761aea0ed1ecadc8ec5679beb4fea1946958b8b7595d9da19464111972c9e591276b4f373302fa52c3de9b482ae

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\23EIUNT7\tourserettulovercomeandkissmehardandsheneverknowthatiwillkissherbodytokiss___iamgreatlovertounderstandtheprcess[1].doc

            Filesize

            73KB

            MD5

            98d2580289f8c25658225ac92aaeb179

            SHA1

            0046a5cf40bafa768b5afa282b91c63dd9fddf5c

            SHA256

            9dbd6f1fb0be8bd4a000ab35f4ab5c9505bf5ec72a17ca1223d7ad240d974423

            SHA512

            5b7301a035d86caa0fce96495abe7c6deef479524072c6614cb5414fbe6c77d9f59e8ebd92cfc3e4ed2c5b99f3f3f53922fee7f8ab13da71c84b9bbc213fb92a

          • C:\Users\Admin\AppData\Local\Temp\Cab874C.tmp

            Filesize

            65KB

            MD5

            ac05d27423a85adc1622c714f2cb6184

            SHA1

            b0fe2b1abddb97837ea0195be70ab2ff14d43198

            SHA256

            c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

            SHA512

            6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

          • C:\Users\Admin\AppData\Local\Temp\Tar8917.tmp

            Filesize

            175KB

            MD5

            dd73cead4b93366cf3465c8cd32e2796

            SHA1

            74546226dfe9ceb8184651e920d1dbfb432b314e

            SHA256

            a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22

            SHA512

            ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63

          • C:\Users\Admin\AppData\Local\Temp\{1ACE4320-B603-45B2-92A6-437C7A6480C9}

            Filesize

            128KB

            MD5

            38b9a08dcc9605d13166f20c5db598ce

            SHA1

            85160b3264a8d88e86d8a236907bc592fdb65086

            SHA256

            ca748f7143117654d569d811aa0e801e87edd3c6aa4572cc8eeeffb73974b583

            SHA512

            cb674c12791c25bf5033123f3e336a83b1124b28326381d93e09fa48a0c791dacffc01829c23beebb24ef903ef3314d148c2794dc3e32811934499559976f1f8

          • C:\Users\Admin\AppData\Roaming\CNN.exe

            Filesize

            620KB

            MD5

            c1986027bb65af159cfaf69397a1b72a

            SHA1

            73263d25be23f26351a8f4e2322f7c049261ddf8

            SHA256

            a4d25fcfbdf9fd1d9c1b9bf4f38604755259cb16e3f920374c61e42bcf0a72ba

            SHA512

            a4463932938faca35243862e3972e5ddc8ac224d0e738be29864d1b552b37fdcbcc5d625ce66b495597734b96560758ce29bca0d57df7b714cb0c29c67a60c9f

          • memory/1464-94-0x0000000002E00000-0x0000000002E02000-memory.dmp

            Filesize

            8KB

          • memory/1464-157-0x0000000071EFD000-0x0000000071F08000-memory.dmp

            Filesize

            44KB

          • memory/1464-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/1464-1-0x0000000071EFD000-0x0000000071F08000-memory.dmp

            Filesize

            44KB

          • memory/1548-177-0x0000000005090000-0x0000000005112000-memory.dmp

            Filesize

            520KB

          • memory/1548-189-0x000000006A400000-0x000000006AAEE000-memory.dmp

            Filesize

            6.9MB

          • memory/1548-176-0x00000000008D0000-0x00000000008DE000-memory.dmp

            Filesize

            56KB

          • memory/1548-175-0x00000000006B0000-0x00000000006C2000-memory.dmp

            Filesize

            72KB

          • memory/1548-171-0x0000000000E20000-0x0000000000EC0000-memory.dmp

            Filesize

            640KB

          • memory/1548-173-0x000000006A400000-0x000000006AAEE000-memory.dmp

            Filesize

            6.9MB

          • memory/1548-174-0x0000000000870000-0x00000000008B0000-memory.dmp

            Filesize

            256KB

          • memory/1836-158-0x0000000071EFD000-0x0000000071F08000-memory.dmp

            Filesize

            44KB

          • memory/1836-89-0x000000002FC61000-0x000000002FC62000-memory.dmp

            Filesize

            4KB

          • memory/1836-93-0x0000000002DB0000-0x0000000002DB2000-memory.dmp

            Filesize

            8KB

          • memory/1836-91-0x0000000071EFD000-0x0000000071F08000-memory.dmp

            Filesize

            44KB

          • memory/2848-178-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-182-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-183-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-184-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2848-186-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-180-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-190-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-192-0x0000000000400000-0x0000000000440000-memory.dmp

            Filesize

            256KB

          • memory/2848-193-0x0000000068E90000-0x000000006957E000-memory.dmp

            Filesize

            6.9MB

          • memory/2848-194-0x0000000000C60000-0x0000000000CA0000-memory.dmp

            Filesize

            256KB

          • memory/2848-195-0x0000000068E90000-0x000000006957E000-memory.dmp

            Filesize

            6.9MB