Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24-04-2024 01:57

General

  • Target

    2f92decef5d32161f9aed538b0aa26f9abf8f9f64cbe301e47ebd5698cb1a35d.rtf

  • Size

    75KB

  • MD5

    4947ceb95e8bdd74da8bcf401f4208e9

  • SHA1

    f5a49a6ac9a0bb7d3bc0652211938b198b27b6b9

  • SHA256

    2f92decef5d32161f9aed538b0aa26f9abf8f9f64cbe301e47ebd5698cb1a35d

  • SHA512

    7c08e72393f0adbec1a92e7d2a067a60764a94c1b6077f7bf3cd1910b2eb77e04690fe0b3b9dca8d0380d9bd94ab5c808267631f175ddd914f04c12ba644120e

  • SSDEEP

    1536:3MRoht2EqiWz6PuoOa1wVVJH8mZZGaObUrffsKzCyH5n59s/d9aPJmmZwOcuUi:8Roht2EqiWzoKaeVXH8mZZGafr8yH5nJ

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vila-gabriel.ro
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    bVkMH6R.pfF~NN@ossy$W!_pz[bh!9l(MU%UtX9L^W}vO=mn*g*;]}]

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\2f92decef5d32161f9aed538b0aa26f9abf8f9f64cbe301e47ebd5698cb1a35d.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:112
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2932
      • C:\Users\Admin\AppData\Roaming\HJCL.exe
        "C:\Users\Admin\AppData\Roaming\HJCL.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Users\Admin\AppData\Roaming\HJCL.exe
          "C:\Users\Admin\AppData\Roaming\HJCL.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:928

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\HJCL.exe
      Filesize

      807KB

      MD5

      23b94e1b073e54606fcf106d3c5d8286

      SHA1

      1fd95874cb88ba3b557c440c5cd6f5f8639723ce

      SHA256

      6b54303a91c5bc99696dc0896ec3813bedd9296987d12327348ec3c525aeb5a9

      SHA512

      e434137c29833486f42d5cf3e6c3700d4218c7d19bda2bad6d917d707b099439ef727eb0fa87e7923f27ff8398565f6fc172500404a4909f3da6a285d358041b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      7e810a373cc118e989dccb1a14f36d1c

      SHA1

      97c4dcf629fe51fa20467094ebb68479fc0f6019

      SHA256

      c7c2307986018300cc30c84da26104be0dbaa23bb434fe1759662beb4d3a1041

      SHA512

      f33fea311a5f35182fa7c1605eaf1c5d182090e98c3f53fb16fb839c41e28238761aa5eeb4011af0eed8a6d2cd98209b3114997b816712070a6e7cf080d3fbef

    • memory/928-45-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/928-51-0x0000000004AC0000-0x0000000004B00000-memory.dmp
      Filesize

      256KB

    • memory/928-34-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/928-35-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/928-50-0x000000006B150000-0x000000006B83E000-memory.dmp
      Filesize

      6.9MB

    • memory/928-49-0x0000000004AC0000-0x0000000004B00000-memory.dmp
      Filesize

      256KB

    • memory/928-48-0x000000006B150000-0x000000006B83E000-memory.dmp
      Filesize

      6.9MB

    • memory/928-46-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/928-36-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/928-40-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/928-38-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/928-43-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2196-0-0x000000002F291000-0x000000002F292000-memory.dmp
      Filesize

      4KB

    • memory/2196-28-0x0000000070FDD000-0x0000000070FE8000-memory.dmp
      Filesize

      44KB

    • memory/2196-1-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2196-69-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2196-2-0x0000000070FDD000-0x0000000070FE8000-memory.dmp
      Filesize

      44KB

    • memory/2544-42-0x0000000004340000-0x0000000004380000-memory.dmp
      Filesize

      256KB

    • memory/2544-30-0x0000000004340000-0x0000000004380000-memory.dmp
      Filesize

      256KB

    • memory/2544-31-0x0000000000B70000-0x0000000000B8A000-memory.dmp
      Filesize

      104KB

    • memory/2544-29-0x000000006B150000-0x000000006B83E000-memory.dmp
      Filesize

      6.9MB

    • memory/2544-47-0x000000006B150000-0x000000006B83E000-memory.dmp
      Filesize

      6.9MB

    • memory/2544-32-0x0000000000A30000-0x0000000000A36000-memory.dmp
      Filesize

      24KB

    • memory/2544-26-0x0000000004EB0000-0x0000000004EF4000-memory.dmp
      Filesize

      272KB

    • memory/2544-25-0x0000000004340000-0x0000000004380000-memory.dmp
      Filesize

      256KB

    • memory/2544-20-0x000000006B150000-0x000000006B83E000-memory.dmp
      Filesize

      6.9MB

    • memory/2544-33-0x0000000004340000-0x0000000004380000-memory.dmp
      Filesize

      256KB

    • memory/2544-19-0x0000000000D80000-0x0000000000E50000-memory.dmp
      Filesize

      832KB