Analysis

  • max time kernel
    144s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 01:19

General

  • Target

    b2eaab79de659373164eb6ac758c8140547bf4d7e193e979dce2467cb3c6ace1.xls

  • Size

    654KB

  • MD5

    e9d2512f562571e95e8a30b9feeda6a0

  • SHA1

    55005d3f55531701ed75c02e837d1550716324ae

  • SHA256

    b2eaab79de659373164eb6ac758c8140547bf4d7e193e979dce2467cb3c6ace1

  • SHA512

    25c48a7def0f32882d58f811ec2cc3665c103654509a1837308d3e96fad942143203ccf20f9abe37a63c4b8b7ef2d425442cec98817cd9f1b8195bc02ff9f9c9

  • SSDEEP

    12288:3kTCQ5HK3hrUP/qPQZR8MxAm/SXOhJEcNxLX9lm0XN6WbxxPpFcwF:GCQ5HKRrUP/mMxSOXEc9hXN6gpFh

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\b2eaab79de659373164eb6ac758c8140547bf4d7e193e979dce2467cb3c6ace1.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1668
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1844
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Roaming\vnc.exe
        "C:\Users\Admin\AppData\Roaming\vnc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2948
        • C:\Users\Admin\AppData\Roaming\vnc.exe
          "C:\Users\Admin\AppData\Roaming\vnc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3032

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      e911d5250fd2c67530801b2c146e56ad

      SHA1

      c5452baaee6e85d4129c0f35f5d4182fa3b225f8

      SHA256

      c27edf2fc78bb8ea82d5bca8f2aa9a6ba9a7a62f8e75c9f1af92dec7bfcb229d

      SHA512

      0eb3e6a4bffe7eca9f3c62e89c71f92b2e4527cd240cfd0743a5abf492e44f7c22128c402c02b34177f34ae83f06fa24cf22fbabab58ecc4fc4935e342f56b1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      1661fe15265f104b6e71f7e2c24f0bb8

      SHA1

      89c0f2f61a6c1020b7d22624979535b2164ac6a3

      SHA256

      58b315c5b3d198f42a0d7e2216a693a72fdfc9b3d5cb125c6eda95faf6ab3bec

      SHA512

      f1ce16af1bba29de4deee44a7caa73d729416c741219fe6b19bd2e1ec9052ebff52f1b6bf41095cb603bc43227e5e658ace87ee7e598445791ab8dc62649904d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1231fcc3d026a88cb1464aba0cb0cff5

      SHA1

      36918e2142503fcebbd5386d53334cbf94462ed9

      SHA256

      27b9c1c9c9237f5b1cc31f834e1aacf1a249b4c791dafeb86e1b7ebdeb7dbb01

      SHA512

      4fd4960c6695e480a2ba2a4f7fd3037c851359bc5286603e782b27f087552bf056ccd88c852e6ff86a86f9f67aa01b4377b5eeecc3582cdefe9364140027d4a9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      392B

      MD5

      5d96343b26a4a9bf1b602b2a595f2de7

      SHA1

      f8f5b3b7627255b404330964bdd16dea9b6611d3

      SHA256

      8733e7c7b582850d60a788d09f4191f77b553efd2408f840ae3aa06c08b7318d

      SHA512

      9800cd59434bc7ea1f47c97c3c6023648189a3975ee64cef8f5407f67a307e6eac87257bd8e1cfbddbe2caf1e421c9c40368e2f9944c47aa58e44f19bf12eaed

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{972F97E3-22B3-44AB-A706-2961CBE68F45}.FSD

      Filesize

      128KB

      MD5

      48dd46c4a569bc6d747be395cd428a15

      SHA1

      e3e68c0ee761c14748942ff5e7c2cee32a523469

      SHA256

      9b453e461fa8991d2bd6b19b39fe40717f22c08bf1c2b218cfdbb864a6c9b2a6

      SHA512

      d6df3ca9cb07a1c1c94b00a9f1a94355ec19a4cfce079b460011e49a6023db52f84872b5578cdcadedfb80e92edf717c83cb3950345aae3751e09c24e9a5c8a3

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      d54c6337b1632af5ba35c086e735f0de

      SHA1

      7249336f945fddf6a2ef899db3db21dc73e4c1f7

      SHA256

      6f47f5ee2c8478570ceeb01276983a73e062ca69328e88e869a59c2f8f418287

      SHA512

      47440237c007f8d62971a2f4c5469e39392e28a487d4aba649424dc7b44a93409a1374539eefb9acd088e2d4f4f2a6a2389257fe2986e5c2d3a072bbff25b588

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{7770A902-9AD7-4704-A469-6D2845B73565}.FSD

      Filesize

      128KB

      MD5

      809b41c09c8713e42a6905ccf8087749

      SHA1

      805cfc73ada5df21d7251c7242460871cde19551

      SHA256

      c414251dd7da280f3913ef9c3f97758a819e2ada8162d18fdc7ba25cfa7bdfc4

      SHA512

      8ea60e92b1587f56e9b3a1dcb25681a88149b513824bcce0234a439ad36e5b82eb86e725620c5ae7177f68e552e2fc2a09d6bb0bb6f4b5fe0eb1876bd378192e

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\H09CVCL3\beautifulthingstohappenedeverypointofviewtounderstandsheisgreatandbeautifultounderstandsheisgreatgirl___ireallyloveflowers[1].doc

      Filesize

      66KB

      MD5

      faf0cacc6b11e438c4bfec5aff2e4927

      SHA1

      5cf83a1bab6d3c0c21b79df80727adc7eb39f61e

      SHA256

      b97cade97346326830f1da704b1f861ac4fb79c0243dce2156518e235b350904

      SHA512

      4ee2d9e5988de6624d4c097d548213bf88e8caa5bb9233f9557648c701cd90bd87580b65b1e4bb91cf92a13642f4c468a9375e37eca46878f726fd906d397f07

    • C:\Users\Admin\AppData\Local\Temp\Cab3BAA.tmp

      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\{772F5B8F-FC81-4B23-B4DE-33EF46D32A9B}

      Filesize

      128KB

      MD5

      eb58a28ae8a95ae0af8ffc3c5d0ada32

      SHA1

      5615f98699228dce4153e66f78acf9d53b938e59

      SHA256

      a4f9f6d8d7d101e15a3486eb0390681fdad1dcc88d60acd4bb8abcb71699e4c9

      SHA512

      5edc4e9875f8de8e4ed188bdaaaae12c8f3f20c4a3255b08e4319e235261e91a199fcc78e6f90373d8a1d46e07313fc4b4ace8102735c4d199a82c45803a1553

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      8d3687b705f0e17c7e86610a3e466601

      SHA1

      f201f32677880ee98ec8429ca9c24d66d9be346e

      SHA256

      5cbc86995a46e23b2819b8319a02889279d5b7f77e6d12e47094614edbc28da3

      SHA512

      8743bcf475ef8c40a015b3627403814817299649128cde518d4e1fd8c938570577a3b12f83a0d23fee1b2cb813c50e6dd24b84306426c56a3e9316fb3cb37a66

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\H96PIYAA.txt

      Filesize

      71B

      MD5

      31340acea5d2a6c1ad01c5627d13ef75

      SHA1

      fba527da207872c05234adca6d8ce1cbe1b8e870

      SHA256

      979ca621290c7c5617c351086e5bbfce9a3e1bf737acfed0fe823d6c9a547e6a

      SHA512

      8064f840dc6a8b37a6454f1b37639939a1073434c9aec325d272e0807ef1857e40ddddc073dd1e12245c814b678b14a3c2171c6664155fb8f41e58431ba6f9f5

    • C:\Users\Admin\AppData\Roaming\vnc.exe

      Filesize

      693KB

      MD5

      96cb932974b4d07cf7d11caef8c1d590

      SHA1

      d75be7456230cf9f0db6e2f8589c11f87918de88

      SHA256

      69f065a7b13b8067d3eaa613180a3ba2fb2f03c658b6f398209024700d288bf3

      SHA512

      c60cccf9eba48dad4563e48ba6017aa3bb5411aecfef413ea74b7cce443e646d26309a93234357a20d85887866de3bc7d07c95e7c1c3be6e1594329c9c0e351f

    • memory/1668-25-0x0000000002470000-0x0000000002472000-memory.dmp

      Filesize

      8KB

    • memory/1668-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1668-129-0x000000007285D000-0x0000000072868000-memory.dmp

      Filesize

      44KB

    • memory/1668-1-0x000000007285D000-0x0000000072868000-memory.dmp

      Filesize

      44KB

    • memory/2780-24-0x00000000036D0000-0x00000000036D2000-memory.dmp

      Filesize

      8KB

    • memory/2780-22-0x000000007285D000-0x0000000072868000-memory.dmp

      Filesize

      44KB

    • memory/2780-20-0x000000002F861000-0x000000002F862000-memory.dmp

      Filesize

      4KB

    • memory/2780-169-0x000000007285D000-0x0000000072868000-memory.dmp

      Filesize

      44KB

    • memory/2780-168-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2780-146-0x000000007285D000-0x0000000072868000-memory.dmp

      Filesize

      44KB

    • memory/2948-132-0x0000000005700000-0x0000000005782000-memory.dmp

      Filesize

      520KB

    • memory/2948-131-0x00000000006F0000-0x0000000000706000-memory.dmp

      Filesize

      88KB

    • memory/2948-130-0x00000000006A0000-0x00000000006B0000-memory.dmp

      Filesize

      64KB

    • memory/2948-128-0x00000000004D0000-0x00000000004F0000-memory.dmp

      Filesize

      128KB

    • memory/2948-126-0x0000000000140000-0x00000000001F2000-memory.dmp

      Filesize

      712KB

    • memory/3032-145-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3032-144-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3032-142-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3032-141-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3032-139-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3032-137-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3032-135-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/3032-133-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB