Analysis

  • max time kernel
    122s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2024 09:27

General

  • Target

    bec2fda815cb641d2ece253992b14f6bef8a618f0ff44a8557bff5ce3e1588a6.rtf

  • Size

    102KB

  • MD5

    4a508215899ec70680e28f8fdceb7831

  • SHA1

    cf759a2010caad8779ff4b4a89d24c679b9fafa8

  • SHA256

    bec2fda815cb641d2ece253992b14f6bef8a618f0ff44a8557bff5ce3e1588a6

  • SHA512

    b2a8c49f5d19a38f44517c8d6cb9de2ad46cff724084c30a486be2b257a7a17acec8d770084ae661958f899423ea28705b8874e61db6032f099a1fcacaa85f0d

  • SSDEEP

    1536:NwAlRkwAlRkwAlRBqu9UDXaIW9on8vuew0:NwAlawAlawAlHqu9UDXaIW9on8vuew0

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.scootero.cl
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Dangote1235$

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\bec2fda815cb641d2ece253992b14f6bef8a618f0ff44a8557bff5ce3e1588a6.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1424
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Roaming\mrndo13577.scr
        "C:\Users\Admin\AppData\Roaming\mrndo13577.scr"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Users\Admin\AppData\Roaming\mrndo13577.scr
          "C:\Users\Admin\AppData\Roaming\mrndo13577.scr"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2444

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Modify Registry

    1
    T1112

    Credential Access

    Unsecured Credentials

    4
    T1552

    Credentials In Files

    3
    T1552.001

    Credentials in Registry

    1
    T1552.002

    Collection

    Data from Local System

    4
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\mrndo13577.scr
      Filesize

      128KB

      MD5

      f14c02f413ab3910e3bc62384d1ba1e1

      SHA1

      efd52f248384100aeeebe475ac834a62eb2d55a3

      SHA256

      62062f3ffcc3a57ea9a140dffd12c586d27ca6860b68995afc159364b9e5ebad

      SHA512

      c7065a3a44ae95007c332063f4e0fc1a1df8fff1fcbeee904b16282758fbac67a6cfc7717496365236c606ebbc9df5c38d7165a5a3f930631b604164929a2894

    • \Users\Admin\AppData\Roaming\mrndo13577.scr
      Filesize

      747KB

      MD5

      12b911184764baa27081730190bdd5cb

      SHA1

      b970084dc098414c802cad7b9556ecd2be17c9d9

      SHA256

      17f3991f2e7399c32f1934ebe8bdc83825ddbdd5679436f37982f529e145b850

      SHA512

      06da4d28788683678ef2eedd336fdbf303c2f053b4e899f2d747f5d0015bc4b1040522a67d64af4231b36eb0b342e4828aa9c2b6477c4e6c59d7a9c2fd76676c

    • memory/2112-32-0x000000007188D000-0x0000000071898000-memory.dmp
      Filesize

      44KB

    • memory/2112-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2112-2-0x000000007188D000-0x0000000071898000-memory.dmp
      Filesize

      44KB

    • memory/2112-0-0x000000002F171000-0x000000002F172000-memory.dmp
      Filesize

      4KB

    • memory/2444-43-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-55-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-63-0x0000000004B60000-0x0000000004BA0000-memory.dmp
      Filesize

      256KB

    • memory/2444-62-0x000000006B310000-0x000000006B9FE000-memory.dmp
      Filesize

      6.9MB

    • memory/2444-40-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-42-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-60-0x0000000004B60000-0x0000000004BA0000-memory.dmp
      Filesize

      256KB

    • memory/2444-44-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2444-59-0x000000006B310000-0x000000006B9FE000-memory.dmp
      Filesize

      6.9MB

    • memory/2444-51-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-49-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2444-58-0x0000000000080000-0x00000000000C2000-memory.dmp
      Filesize

      264KB

    • memory/2880-33-0x00000000007F0000-0x0000000000860000-memory.dmp
      Filesize

      448KB

    • memory/2880-30-0x0000000000300000-0x00000000003C2000-memory.dmp
      Filesize

      776KB

    • memory/2880-50-0x000000006B2A0000-0x000000006B98E000-memory.dmp
      Filesize

      6.9MB

    • memory/2880-31-0x000000006B2A0000-0x000000006B98E000-memory.dmp
      Filesize

      6.9MB

    • memory/2880-39-0x00000000003E0000-0x00000000003E8000-memory.dmp
      Filesize

      32KB

    • memory/2880-34-0x0000000004720000-0x0000000004760000-memory.dmp
      Filesize

      256KB