Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    14-05-2024 01:27

General

  • Target

    1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls

  • Size

    420KB

  • MD5

    65ae45789b58f1e03a4f8c3f178e6b30

  • SHA1

    4eb87b3825da0d23d7f7091c2976e1e95cc40907

  • SHA256

    1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0

  • SHA512

    6d7da073e7280bf84612920a6371b19a1226fa50747587dbfe9fe10ed6bdf514ab8b171605d34a0a090d5f9ee3dbe4ec5e6fa379a73dc4675c8f4e46e359e864

  • SSDEEP

    6144:NZ+RwPONXoRjDhIcp0fDlavx+W26nAHu8uniSHBMixiMK6G+ZFrTUvCp4sJgpQMD:31iQpozwjTqCfgdhd/+Z4uCz2BFmDiP

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1ccd3e2580b4e0de27bfeae3a92d638230c573704c66a06a0e11018224d176a0.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1704
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:468
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2520
      • C:\Users\Admin\AppData\Roaming\vnc.exe
        "C:\Users\Admin\AppData\Roaming\vnc.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1740
        • C:\Users\Admin\AppData\Roaming\vnc.exe
          "C:\Users\Admin\AppData\Roaming\vnc.exe"
          3⤵
          • Executes dropped EXE
          PID:1440
        • C:\Users\Admin\AppData\Roaming\vnc.exe
          "C:\Users\Admin\AppData\Roaming\vnc.exe"
          3⤵
          • Executes dropped EXE
          PID:2036
        • C:\Users\Admin\AppData\Roaming\vnc.exe
          "C:\Users\Admin\AppData\Roaming\vnc.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:2776

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      1KB

      MD5

      e911d5250fd2c67530801b2c146e56ad

      SHA1

      c5452baaee6e85d4129c0f35f5d4182fa3b225f8

      SHA256

      c27edf2fc78bb8ea82d5bca8f2aa9a6ba9a7a62f8e75c9f1af92dec7bfcb229d

      SHA512

      0eb3e6a4bffe7eca9f3c62e89c71f92b2e4527cd240cfd0743a5abf492e44f7c22128c402c02b34177f34ae83f06fa24cf22fbabab58ecc4fc4935e342f56b1d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      724B

      MD5

      8202a1cd02e7d69597995cabbe881a12

      SHA1

      8858d9d934b7aa9330ee73de6c476acf19929ff6

      SHA256

      58f381c3a0a0ace6321da22e40bd44a597bd98b9c9390ab9258426b5cf75a7a5

      SHA512

      97ba9fceab995d4bef706f8deef99e06862999734ebe6a05832c710104479c6337cbf0a76e1c1e0f91566a61334dc100d837dfd049e20da765fe49def684f9c9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EA

      Filesize

      410B

      MD5

      b590a918f8ea2f44b670b949cbff2835

      SHA1

      67de0352041833e6e88f0b438b5e6cbdad21ba0a

      SHA256

      330b77f2fbbc5085de2e0208a745f6ede360afe0d31a7539c1b020b51e5494ef

      SHA512

      b603db763db1f69a12cc14d02dedfc45ea8521206f77fd6fbc2714aaff686be312869a0d0507d87fc6037bc2aeb9f9bbaaeae10b8c5cf45709d141d4128e18b9

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b3923e9d96587b66da516d5db2cb3181

      SHA1

      88f1ca0326af1845dc3346a39b50578d279655c0

      SHA256

      4aa79bee365827111db218387ce3ac135bea82ef771167ebeaabd60ee47ee084

      SHA512

      29370e60555b5e9bed22b478a8ad7e9fa3a848575d7e1b7ee4875cfcd0688f16e6008b141520b56bcb61d823920a12b2e35d81771fc522e2390f69c3e489158a

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CAF4703619713E3F18D8A9D5D88D6288_F2DAF19C1F776537105D08FC8D978464

      Filesize

      392B

      MD5

      560dcc28356ce1087e5a68861064d575

      SHA1

      da03424bcf715bb8ddf6a44cc7612823c3571486

      SHA256

      266f7f97cad12306e36d17c536df4e26a02b228c54fc661ec212b1aed5bde603

      SHA512

      6bff7115d53f364c54dab194921a8a34e845cbaa3677a01c5d4679b41377a90f891c9c88475042a59ef3ea0bb9c3e6ef181803619d3fb3e142718d2d4aa303bc

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{B88237B5-6C6F-491F-9024-8271AEE84870}.FSD

      Filesize

      128KB

      MD5

      8da3a07561068930661fd05394a1411c

      SHA1

      5ab5cdfef8b42d64fd15652ea317a88101ba7df6

      SHA256

      9736a20ac8efd68c20fbcdb14d5699ed7787286997a033862b7b39780210208f

      SHA512

      c14a06cc452ee490970c363bfbf7929b9ae55eb91467b70784ac212e8889f6732401d4887a7108a2611ecb1e7c65e0b1e4e908f98e7e63585116f8d83df0ec71

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      ad045758e0a1d7a6f798c94f266a4ace

      SHA1

      72881be6d0df5aa76c02d09cad2b0b3034a78fa0

      SHA256

      2acdacab8be91119d6175fe454ae18807d0bade2d14aa4519245089438cfd2ea

      SHA512

      d95cefce08cb23c8ea4cab79642a77a34f3bec044d4650016f4aa5ffe3c2ceae37d0eacc0bef09b0d18e929e79ef418326ab44a1a37990c42469d9ccd6b57b61

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{615D80C8-703B-4CFA-B695-F0D60B5B4D30}.FSD

      Filesize

      128KB

      MD5

      202bef199e7692911b8ff0035bd14cae

      SHA1

      ee7a9920ff37a5ec402ad3ccfc30bbadc083ab9a

      SHA256

      4d85e0305f55a7cbdb6cbd990a791365cbf437d39cf0b3510a8ab004fe9ee4e5

      SHA512

      e23230a4fec8f274466c1a6839cfd0a7a9bf7cf24bc3017d89be1b559ccc163666ae43aed72f347e43b71954900fb4a5b6ceb7d88fc096c60547ae4c8b8857fd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5DKX8QD5\everythinggoingfineandgreatwithbeautiuflthingstounderstandhowmuchsheisbeautiufleverytimeiwanthatgirltobeonline___reallyamazingbeautiuflgirl[1].doc

      Filesize

      62KB

      MD5

      92f0065ee050a8dcd89fc59eddb048c7

      SHA1

      7cba72ead525aa1bdfd345932c482d75c466c038

      SHA256

      e68d3b5df02784a45bd0292c8526942e01c2817cb45dbbee9ef76face03e9830

      SHA512

      9c930fb53ac1e2dc37d680eecc4777a66ce7016279a37afb097c886fac2031ace81065d06073208bb9f23c842661fb063c6fe2275bc9cfb0b5246f228336d20f

    • C:\Users\Admin\AppData\Local\Temp\CabBB93.tmp

      Filesize

      65KB

      MD5

      ac05d27423a85adc1622c714f2cb6184

      SHA1

      b0fe2b1abddb97837ea0195be70ab2ff14d43198

      SHA256

      c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

      SHA512

      6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

    • C:\Users\Admin\AppData\Local\Temp\{74EDDBEB-FB4B-4C55-8295-A62E83A495F9}

      Filesize

      128KB

      MD5

      49716cb75ed3a3be0acd22fc40f04b6b

      SHA1

      cba221e2a85ed890fbe5c5de85a0f072f1e37fcf

      SHA256

      99a4a67cfc07e587d1c433bbcd5fc35a70a870c37f66809ae907f05e3d3420b7

      SHA512

      388d55682a94a47b57e9aa96311ebc7015bb96d959ba7b363bc9935eec994e53b475906003bba8543eef6ab61d1238e5463c471e4706243be2a74365982a7fff

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SOPX319U.txt

      Filesize

      69B

      MD5

      a39405e90a85268881bc8695538d7b1c

      SHA1

      73acb88b44b88e886927bb77a152c9cfa3c812e5

      SHA256

      29d37ee8f8bf155c5012b13b3b1762f8316d0f1897f5a2d4b70a58591c8c38de

      SHA512

      e5bc18398dfc6756e6303403946d21b26ec29601572d973933267f46ba56035940d6de62c089b65f3b296658ff3b95592001dad9110943968c4cea106bfa81d9

    • \Users\Admin\AppData\Roaming\vnc.exe

      Filesize

      913KB

      MD5

      db766903cd5f003402db89a67968106a

      SHA1

      bba10727b27c3cedd60fd41aad673d3b821992ff

      SHA256

      1f342838ff41a1b4c23948e0580beb345bc788fbd6f664ca822b5918fa5a59cf

      SHA512

      5fa2633efca945b2760d98c41e4e16a41ad2b46f71a931310f6c364135a7ba6748a2ae287a0be4f7b65bf136ded1364df224efc2bb2ffb646eff08f21527d036

    • memory/1704-27-0x00000000034E0000-0x00000000034E2000-memory.dmp

      Filesize

      8KB

    • memory/1704-1-0x000000007229D000-0x00000000722A8000-memory.dmp

      Filesize

      44KB

    • memory/1704-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1704-131-0x000000007229D000-0x00000000722A8000-memory.dmp

      Filesize

      44KB

    • memory/1740-134-0x00000000078E0000-0x0000000007962000-memory.dmp

      Filesize

      520KB

    • memory/1740-133-0x0000000000640000-0x0000000000656000-memory.dmp

      Filesize

      88KB

    • memory/1740-132-0x00000000005E0000-0x00000000005F0000-memory.dmp

      Filesize

      64KB

    • memory/1740-128-0x0000000000250000-0x000000000033A000-memory.dmp

      Filesize

      936KB

    • memory/1740-130-0x0000000000570000-0x0000000000590000-memory.dmp

      Filesize

      128KB

    • memory/2440-26-0x0000000002DF0000-0x0000000002DF2000-memory.dmp

      Filesize

      8KB

    • memory/2440-22-0x000000002FD51000-0x000000002FD52000-memory.dmp

      Filesize

      4KB

    • memory/2440-24-0x000000007229D000-0x00000000722A8000-memory.dmp

      Filesize

      44KB

    • memory/2440-150-0x000000007229D000-0x00000000722A8000-memory.dmp

      Filesize

      44KB

    • memory/2776-137-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2776-149-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2776-148-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2776-146-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2776-145-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2776-143-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2776-141-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB

    • memory/2776-139-0x0000000000400000-0x0000000000440000-memory.dmp

      Filesize

      256KB