Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2024 07:52

General

  • Target

    QUOTATION.docx

  • Size

    295KB

  • MD5

    8feb6e9bf1782987b2d83aa5a39ae5d8

  • SHA1

    49b44a52ab776e48377c6d56a4d7b09f717ae555

  • SHA256

    7ccfa149c82865c7bef38d83a3cfe955fcbe8aad03a61c05b3281b1a9dd2e858

  • SHA512

    965c11aabf49e32de333d2b2c76928c74146305174f33bc82bd59f9408800f994cfa5e987fb46122ac7970203de799bb83ee70afadc60aa9bc985476aecbceea

  • SSDEEP

    6144:WGK/46IXgfuFO6S951ndPJ8fUeuCf9fLhCMG8f/W/:WGKgwfu4h1dPifUeuCf9fFZpfs

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6981982105:AAGJZG7U4ELI-QLExHS4a6AlsLp__P5_opc/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\QUOTATION.docx"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2844
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1540
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1896
      • C:\Users\Admin\AppData\Roaming\htm.exe
        "C:\Users\Admin\AppData\Roaming\htm.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2828
        • C:\Users\Admin\AppData\Roaming\htm.exe
          "C:\Users\Admin\AppData\Roaming\htm.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:760

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      49a6c329bb86c8356ff60ae5e4a24b20

      SHA1

      726639455d8390ffeea6f99995849a98776327b8

      SHA256

      7238e2db2ab305febb02e06fdf14fa2a44039e5602528cd5c0f0d7f696a30ed9

      SHA512

      93f884d6fff94a5a037f63c6d7f414f70f10d27f38c5d1e62c330406e6df8a50bc7f542f3ac400500a98e9f9b4c11249be325eba906f13fceed1e9543025908c

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MPR7YYBV\attractivesthingsmusthappenedalwayswithmetogetitbackeverythinggoodforusbeautifuldaystartingwithme___tounderstandhowimporatntitistomeforentirethigs[1].doc

      Filesize

      73KB

      MD5

      6792b56004620587542f9e8f36298a7e

      SHA1

      5a37eb281189d37ce4a4a8d8f125f31926e20897

      SHA256

      3dfb687e656a50bfb9c1570dee36faf5b5fee99b9c319e1de8daf11b2a3b0cb7

      SHA512

      afe6e11249548db9e251bdf67cdd76ad9422b420e5e40acb957dd7b92142e6f0baec06922ba9ee4b3c6f1dba4aedc872851cee6608c9e820eb41d6716e74ab43

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\99FBCA3.emf

      Filesize

      1.4MB

      MD5

      476c7c2f309c957f6428d04e94c4f64a

      SHA1

      f1b0fa252babfb7002dc87069a436ad71bda532f

      SHA256

      c0da66b866cc999aee20456c2eee3eefc05046b8f5df3755f95fecb85f9f8be5

      SHA512

      c941fbacc6c98b556ea742538b2f2c61a66be677aa5f97457dfe07ea9652e17fe545ac05740f8ed20b1449fdcf38e97c49fe73ff8d53220a4e8d3e6e3615854e

    • C:\Users\Admin\AppData\Local\Temp\{A1141C56-30B3-4D33-8398-B1EFD2094B51}

      Filesize

      128KB

      MD5

      d0f436b00d7598909a8033f69c9ef26f

      SHA1

      49dc61294d72d08d43911321377f5497509b4756

      SHA256

      33961f8cf102a769cc6b8263ad0a61d71a87ec5389f5284a98aadaa747a60056

      SHA512

      8dc2c282760d440c07b59a00e348aeff1cb33e3029e5264fb322d925378bc961e95de9eee237e63a53a233bea6f2f8c81790a77c29482a36dec842b2a181a4ce

    • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

      Filesize

      48B

      MD5

      f8b4640fc06b49f809b72a972bb8941f

      SHA1

      faca1050f54d24e3bf18b4323f52e9485c22bebd

      SHA256

      46c57e69a90644568b3c2dd04cec0b5751384061c9b0d128fce03d2c4c8a3a3b

      SHA512

      ec7bcf360103a629088f4ede996924e70192113f417c2be9432194b25fd6fd0c5588da50c06a311eca0b178a8baf12c5b1c4481500c230d7d1e2574976663c7e

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      766d41ed1fa7e445de7951ea1f3bbd0d

      SHA1

      539857efc2709733ace3b39f94c18099335e5721

      SHA256

      53fbb2f37c53d583007d89f7721cc4eec94f6a7c2aba08173cffcb0c463b4d0b

      SHA512

      a1ed60a3feb118a8c5d0893b264cf877830a346b23b0b988533844ecb1b8b4064574bc10be27a8dea6854f644ad8408fde8307aa594c8ebad7ed7da2f7f65d12

    • C:\Users\Admin\AppData\Roaming\htm.exe

      Filesize

      822KB

      MD5

      951b2266dc6f1ae53219ff7cefbc89d6

      SHA1

      0683033b2b25363f4b3328b58733936943758eaf

      SHA256

      1bc2001563ec7cb81fc1d7086b7d8bf36b285354015654b9ac2bcf051c68d2f7

      SHA512

      df01e3436dc342143243451a91b697b088f87aba60e7a9d87939361ec29d636cd8b608a4a006734bfc0d70246eb7b46057c001dda457897a21a9d9e76a024f1b

    • memory/760-221-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/760-215-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/760-213-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/760-224-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/760-219-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/760-222-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/760-226-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/760-217-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2828-212-0x0000000005940000-0x00000000059C4000-memory.dmp

      Filesize

      528KB

    • memory/2828-211-0x0000000000940000-0x0000000000956000-memory.dmp

      Filesize

      88KB

    • memory/2828-210-0x0000000000930000-0x000000000093E000-memory.dmp

      Filesize

      56KB

    • memory/2828-166-0x00000000004D0000-0x00000000004EC000-memory.dmp

      Filesize

      112KB

    • memory/2828-140-0x0000000004E50000-0x0000000004EFC000-memory.dmp

      Filesize

      688KB

    • memory/2828-108-0x0000000001070000-0x0000000001144000-memory.dmp

      Filesize

      848KB

    • memory/2844-0-0x000000002F901000-0x000000002F902000-memory.dmp

      Filesize

      4KB

    • memory/2844-2-0x0000000070CED000-0x0000000070CF8000-memory.dmp

      Filesize

      44KB

    • memory/2844-228-0x0000000070CED000-0x0000000070CF8000-memory.dmp

      Filesize

      44KB

    • memory/2844-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2844-252-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2844-257-0x0000000070CED000-0x0000000070CF8000-memory.dmp

      Filesize

      44KB