Analysis

  • max time kernel
    144s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 01:03

General

  • Target

    c11fd5e849339af078eb9ff7344b4d45f8d86e45a11285142ecfe28fbd01b243.xls

  • Size

    336KB

  • MD5

    fc69aae977bd3c5a56d4acce831dbac2

  • SHA1

    fb86b1fca4340e6ac163aeb638acd83dff4f52f5

  • SHA256

    c11fd5e849339af078eb9ff7344b4d45f8d86e45a11285142ecfe28fbd01b243

  • SHA512

    ea24470a046528a8649e64658f49a85543820e807437eb0ff79a1e92232641f2b215b46fc7fa2b57f4074ea3b9e3be42463c23ae832dbcaf1319cb91cf5dc4c5

  • SSDEEP

    6144:2EXaFJkKXiDU7wI4wdY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbVy4MINAwKY:2AaFiKXKPwk3bVy4MIKwKBZ5QjKss

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\c11fd5e849339af078eb9ff7344b4d45f8d86e45a11285142ecfe28fbd01b243.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2872
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2020
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Users\Admin\AppData\Roaming\HJCC.exe
        "C:\Users\Admin\AppData\Roaming\HJCC.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Users\Admin\AppData\Roaming\HJCC.exe
          "C:\Users\Admin\AppData\Roaming\HJCC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1832

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{003E6F45-3969-4494-A687-76A508EDA9EA}.FSD
      Filesize

      128KB

      MD5

      c7c61c0a8fd24ab07eca46246f993f4a

      SHA1

      b1af9f03ea9a0de52c1dd138062f79c34bb8b8da

      SHA256

      13b8e951257354f148ba2913cf6c6ff17348b7eb56d597f1f85173d98950e1c7

      SHA512

      456037096db752a71b611793892beca007e902cea436ca86aaf744cbfc77866fa7c716cf4e0b49e79ac44aa817a60b1e3c77bed93b8f17ffb341d2be12c2cb56

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      cdccb118b5035f8ec78dd88b5eea818c

      SHA1

      9878a799dd6df906bb73d93e57c42ecefed6d533

      SHA256

      e6bcbf269a9443960f7e4523e21713f0f9bf3f3cbf6eb23d06458678a5d02c2b

      SHA512

      5331e124d98cad8fcfdc05e4393d9da0e84990640d6af2f3c8f7ea72336469dc3ffee7ec20a650794e5f7566f3cb1ee39cc9ffa05b80c0af8f5b788269d09a65

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{BDADEE4A-DB09-44B1-8047-8A12F57D5E6B}.FSD
      Filesize

      128KB

      MD5

      dcba72b46c06d42d722455c14332ca83

      SHA1

      dbdee6a43d5c9331fd13b5fd67295e0ebad8706c

      SHA256

      f37b274c706d310922bad16578f978a25317eca8b5a517cef4c1a8ed00e8f605

      SHA512

      a1b49a985f41616ddd9db91ead92af4bdc5f0a56aa7616e0e4569a440eb31ae2b8042aa7dc56c2d4cfc0e6e4fa2ae1a9dbe6ce9032022e1884750e76075dd8be

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\I819HQXH\somethingismakingmecrybecauseitriedalotbutpeoplesarenotgoodaroundtolovethisgirlsheisbeautifulforme___shewasbeautifulgirlilikeme[1].doc
      Filesize

      80KB

      MD5

      936c418052b1b7ffb4d54f12f368755b

      SHA1

      020887b31d11545bb26da2f277bcb2e80139f2a4

      SHA256

      3fc654e7d6b273a61a952744b1dd1d6f40d3468bd8fa98802ba7e5de4a339fbf

      SHA512

      8e0908e03b53d0a8b31ae3fba62024157afe215b70c45b4fddb5f5a5d0c2550f38d986bf4183e23102ba376484a2de67caf236a99af98b78b321f59e3103d05c

    • C:\Users\Admin\AppData\Local\Temp\{4BD6200C-A2D1-4777-B843-AC91D842BA5A}
      Filesize

      128KB

      MD5

      47efbb1cd1361e90f85c9fb60cf275bf

      SHA1

      ac956fc4c073d4b7024fd528955cb374235d8edc

      SHA256

      d7abde715687eca76951b2c65f99398bdc7f5557ee21958ee1c6a6ddf66cf113

      SHA512

      8e750599051dfdd3eab00ea47dcd9ef20ec62d4be54421e4def29f91db4cf4dfdbb8b4e9c956ac4c8e1b623b8c2ea5c45f7b275cdfd67c9be678a0613b1c275d

    • C:\Users\Admin\AppData\Roaming\HJCC.exe
      Filesize

      630KB

      MD5

      4d00938c4a2f5e84dfcf150451fc410f

      SHA1

      2c723afe9e5c18fca6c616fb00f9c30cd8a64f70

      SHA256

      c9a6ea3059ed3d614f1c9f357fb355fbef62a74318da0883f2b57d923b57bf85

      SHA512

      e83298b7ad00ce9e082d184a6930a783b6ef62a8167138f8a9f0f0f2a0163406e15f1e5ac99a19a46d0d5778fbcf85dd7de5ffd99073a2df6669288a5a56fd27

    • memory/1640-97-0x0000000000D20000-0x0000000000DC4000-memory.dmp
      Filesize

      656KB

    • memory/1640-99-0x0000000000A10000-0x0000000000A28000-memory.dmp
      Filesize

      96KB

    • memory/1640-102-0x0000000004E60000-0x0000000004EE2000-memory.dmp
      Filesize

      520KB

    • memory/1640-101-0x0000000000A40000-0x0000000000A56000-memory.dmp
      Filesize

      88KB

    • memory/1640-100-0x0000000000A30000-0x0000000000A3E000-memory.dmp
      Filesize

      56KB

    • memory/1832-107-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1832-111-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/1832-103-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1832-105-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1832-112-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1832-114-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1832-109-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/1832-116-0x0000000000400000-0x0000000000440000-memory.dmp
      Filesize

      256KB

    • memory/2524-8-0x0000000003BE0000-0x0000000003BE2000-memory.dmp
      Filesize

      8KB

    • memory/2524-6-0x000000007246D000-0x0000000072478000-memory.dmp
      Filesize

      44KB

    • memory/2524-4-0x000000002F641000-0x000000002F642000-memory.dmp
      Filesize

      4KB

    • memory/2524-118-0x000000007246D000-0x0000000072478000-memory.dmp
      Filesize

      44KB

    • memory/2872-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2872-9-0x0000000002DB0000-0x0000000002DB2000-memory.dmp
      Filesize

      8KB

    • memory/2872-1-0x000000007246D000-0x0000000072478000-memory.dmp
      Filesize

      44KB

    • memory/2872-117-0x000000007246D000-0x0000000072478000-memory.dmp
      Filesize

      44KB