Analysis

  • max time kernel
    119s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 02:15

General

  • Target

    fed5aa29002c173014320d6fd24304d0bd94089c51a06d06e35a66eef84908c1.rtf

  • Size

    336KB

  • MD5

    36fd7195da0b7562c04ba8e3f055e6fb

  • SHA1

    dac1a451343920a8591606f34d1e04872dcb1ba1

  • SHA256

    fed5aa29002c173014320d6fd24304d0bd94089c51a06d06e35a66eef84908c1

  • SHA512

    e4038fe6cefd21e6133a627091888825e7a667b03b555da5562767f7a872b1b5a98c307c6e6184c31a804bd15fcb9ef058d48f42f055f71142b3081066a101f8

  • SSDEEP

    3072:ssXvKMEesXvKMEesXvKMEesXvKMEesXvKMEesXvKMELIGB719Jsn87w4XeW:tKMeKMeKMeKMeKMeKMCzBCn87w4XeW

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 5 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 5 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 5 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 5 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 5 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 5 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 5 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\fed5aa29002c173014320d6fd24304d0bd94089c51a06d06e35a66eef84908c1.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2872
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2356
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2920
      • C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr
        "C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2548
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2664
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JnhNjrgJxHWJu.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1948
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JnhNjrgJxHWJu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD95E.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:1228
        • C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr
          "C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr"
          3⤵
          • Executes dropped EXE
          PID:1968
        • C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr
          "C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr"
          3⤵
          • Executes dropped EXE
          PID:2100
        • C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr
          "C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1664

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpD95E.tmp

      Filesize

      1KB

      MD5

      2f7ddf570e85a1d40a79906cc26f515c

      SHA1

      12c58fb160dc3bb2ed4cb587f8b1f92742d60f18

      SHA256

      eabad9176037a0248583cd1e1b5cfd8d5afbd267ef9b2d40c6e0669868ee944d

      SHA512

      17b91e81de35fb0f80625d05165bf40b13d169063f276c8ed84ad3190da4d121bf04d72f5f445bafa4678121c2b099502215dca5b954921e4fb0f1fd0f77ff25

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      6f64ca5deb78017206f479d95ff6c5bb

      SHA1

      66783f787b47b3278ea54e0ecd77d86f07dd2647

      SHA256

      7e1605c521f201a4e5d4b49b0f0cb91e13ea9a0c38603329506792923e65f839

      SHA512

      f7aeb7de47821755bc2486b48561a5cb85e73eb27443b4945553d45dfa132ab1cd45cce228512bca2e3337b9634338054ebcb35897a2a2e6bf2616f199baaeba

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      3b00be990125df1404548261b91013d4

      SHA1

      9e071da89df723be09821c5e0edc26dd84012b78

      SHA256

      edd60c326f7bc0bebf0de6348afd102985e0640f63b2c084117e612a02c9ab3c

      SHA512

      f5808197c6d7f1280246644ce7a7597ccae59cffef8bcda40fefc09cd3ae5084d808d1955aef04c56a3fe244609b71334b4b3ff4b41268acad046b1767333edc

    • C:\Users\Admin\AppData\Roaming\dzmjjohohj75.scr

      Filesize

      680KB

      MD5

      75fd7827bbf0b22f48275d5882af458f

      SHA1

      022d003d140510e5e9396a4ab4e51b7014d6750e

      SHA256

      8300db91a37cce4dc00aed55b51bd5e469d53b82c67fc662d3eff93c7e341405

      SHA512

      de5ad182c536fdd349bc7db390284ba2a2349001101b122e92015c27be4bb1a5eeccb9e1029bcb468e837631362b4485545dd4916a89c01ac1d64aff60373636

    • memory/1664-77-0x000000006A6F0000-0x000000006ADDE000-memory.dmp

      Filesize

      6.9MB

    • memory/1664-61-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1664-58-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-60-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-59-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-57-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-69-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-66-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-63-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1664-83-0x000000006A6F0000-0x000000006ADDE000-memory.dmp

      Filesize

      6.9MB

    • memory/1948-81-0x00000000628F0000-0x0000000062E9B000-memory.dmp

      Filesize

      5.7MB

    • memory/1948-71-0x00000000628F0000-0x0000000062E9B000-memory.dmp

      Filesize

      5.7MB

    • memory/1948-73-0x0000000002670000-0x00000000026B0000-memory.dmp

      Filesize

      256KB

    • memory/1948-76-0x0000000002670000-0x00000000026B0000-memory.dmp

      Filesize

      256KB

    • memory/1948-80-0x00000000628F0000-0x0000000062E9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2548-40-0x0000000000610000-0x000000000061E000-memory.dmp

      Filesize

      56KB

    • memory/2548-37-0x0000000004700000-0x00000000047A2000-memory.dmp

      Filesize

      648KB

    • memory/2548-67-0x000000006A9D0000-0x000000006B0BE000-memory.dmp

      Filesize

      6.9MB

    • memory/2548-41-0x0000000000620000-0x0000000000634000-memory.dmp

      Filesize

      80KB

    • memory/2548-30-0x00000000001D0000-0x000000000027C000-memory.dmp

      Filesize

      688KB

    • memory/2548-31-0x000000006A9D0000-0x000000006B0BE000-memory.dmp

      Filesize

      6.9MB

    • memory/2548-42-0x000000000A370000-0x000000000A3F4000-memory.dmp

      Filesize

      528KB

    • memory/2548-38-0x00000000005A0000-0x00000000005B8000-memory.dmp

      Filesize

      96KB

    • memory/2548-36-0x00000000049B0000-0x00000000049F0000-memory.dmp

      Filesize

      256KB

    • memory/2664-79-0x0000000002690000-0x00000000026D0000-memory.dmp

      Filesize

      256KB

    • memory/2664-75-0x0000000002690000-0x00000000026D0000-memory.dmp

      Filesize

      256KB

    • memory/2664-74-0x00000000628F0000-0x0000000062E9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2664-72-0x0000000002690000-0x00000000026D0000-memory.dmp

      Filesize

      256KB

    • memory/2664-82-0x00000000628F0000-0x0000000062E9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2664-70-0x00000000628F0000-0x0000000062E9B000-memory.dmp

      Filesize

      5.7MB

    • memory/2872-78-0x0000000070F0D000-0x0000000070F18000-memory.dmp

      Filesize

      44KB

    • memory/2872-0-0x000000002F341000-0x000000002F342000-memory.dmp

      Filesize

      4KB

    • memory/2872-2-0x0000000070F0D000-0x0000000070F18000-memory.dmp

      Filesize

      44KB

    • memory/2872-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2872-104-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB