Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 01:25

General

  • Target

    bb949bbd9084851dde732678a6dbfefca7628df752cb8a7ada6ccecd55c14b93.xls

  • Size

    408KB

  • MD5

    12280821eb7e23095d873ae109f6b675

  • SHA1

    cc6bfbde43e20a9aa6ec5cdb4d8edaddf6c9d530

  • SHA256

    bb949bbd9084851dde732678a6dbfefca7628df752cb8a7ada6ccecd55c14b93

  • SHA512

    212e3dd29cbfbf8567c4b082c6b158ecede03daa432c6547a58f8154162ac5d83307927aa964962fc1b2f81c996d9d790a97b1ff8373efd3197eb64c6d2f8241

  • SSDEEP

    12288:9qFzu4Ljxcp3m5cnINJVStxdtBpghLi2:azu4LjxEboStxdfpui2

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\bb949bbd9084851dde732678a6dbfefca7628df752cb8a7ada6ccecd55c14b93.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2548
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:920
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2392
      • C:\Users\Admin\AppData\Roaming\csrss.exe
        "C:\Users\Admin\AppData\Roaming\csrss.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2400
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\csrss.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          PID:2660
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\bkYKfDjHX.exe"
          3⤵
          • Command and Scripting Interpreter: PowerShell
          PID:2512
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\bkYKfDjHX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDD45.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:2488
        • C:\Users\Admin\AppData\Roaming\csrss.exe
          "C:\Users\Admin\AppData\Roaming\csrss.exe"
          3⤵
            PID:2568

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

        Filesize

        68KB

        MD5

        29f65ba8e88c063813cc50a4ea544e93

        SHA1

        05a7040d5c127e68c25d81cc51271ffb8bef3568

        SHA256

        1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

        SHA512

        e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{0C3FB73D-75D5-456B-A8AC-000A1F103944}.FSD

        Filesize

        128KB

        MD5

        fdbd3416db6b1118ddd3a2939e96c4e8

        SHA1

        77c1b90b6571e3d2edb9af3bc9ae5be0c000b9e1

        SHA256

        bfebe2e36b791f38dc9a89e6737d205108b65293c4dd174ce5324bca684ec6bc

        SHA512

        8cb967ff6e49805b296758ed18d2fdb2d22918cf91a1c8df61f02c9780b504b8302990c6e40382a9834e9be80f46eceea3453d6c0651a4ed46af346de6a2d9ec

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

        Filesize

        128KB

        MD5

        6af0b352658c0d22a4cc89741c61a6e3

        SHA1

        2636f902f599f7441c1cb5568ea40ebc957b38f8

        SHA256

        cdb94e6aeb17d0a03620de8d562d9a57311bb344927a77a3e8e408c0a0499af3

        SHA512

        b1fe43715cced4d6150f230e6745b2caf914012d79048b986de25b7c8b702b793429ab5a830455e3244e0f7631a8eeb4d48240aecef8e61d725db77f26864a6b

      • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{0AB1A010-1731-4528-9A01-53465B64E989}.FSD

        Filesize

        128KB

        MD5

        5c880eb8aaba844c7445a701e3ed6b8e

        SHA1

        1808fc9ae3e253aef053ee5507e5ae0ea1e02ef3

        SHA256

        694c48c8423d4952fe68a311686bdae5fadb3399e8a11d5121ac904001104f36

        SHA512

        dafad4b69c2b80b8c48d00ce31e053eb6925a306a4ed594221323899029c861c8422b276c828f8942974301cbb9bfbad0edfd195da729c14851e7c2a027dee6c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\C2BWBSQC\lionsaregreattheyknowhowtotreatothersbeautifullytounderstandentirethingsgoingtobegreatalwaysgreatnothingunderstand__sheislionbeautiufl[1].doc

        Filesize

        32KB

        MD5

        229327068cf40e9804185ef47f640a70

        SHA1

        3d4012063327219a81eebf1564d10fcf5b51bf3c

        SHA256

        4d602a8f2f0991f334738912e80a99ed7f36e98d6538a493ae3eab73461a374f

        SHA512

        7273b52b5bb09f1854710c7f1f02fad72c9570a425c563f9e855b2563562d31c9e8bdb778225dcde17e14009af9a9541f4aff174e072da22e0569de9db1bf1ef

      • C:\Users\Admin\AppData\Local\Temp\Tar1AF6.tmp

        Filesize

        177KB

        MD5

        435a9ac180383f9fa094131b173a2f7b

        SHA1

        76944ea657a9db94f9a4bef38f88c46ed4166983

        SHA256

        67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

        SHA512

        1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

      • C:\Users\Admin\AppData\Local\Temp\tmpDD45.tmp

        Filesize

        1KB

        MD5

        7e7baf36f6ea3433162623a5f456ba98

        SHA1

        83b4fb71aae2e74a92181f3a95799e758627d2aa

        SHA256

        fdd7345fce00d24977a9897c443798c6308f18e024d3f2adb01947b224b19d42

        SHA512

        831db9c8c571fd964696224a2b17ac3fa38d83beb7a6b548a3ab9f39a621a77753da4e4254e55a104e757c6af76c611031cbc64de1a9ac6ff8b94911dc6d7b83

      • C:\Users\Admin\AppData\Local\Temp\{B321188C-16C2-423C-A08A-5EFDA7DFDF83}

        Filesize

        128KB

        MD5

        a67e8934d67ac8fb0ed91b45fd998ce0

        SHA1

        6b706e92df02d16386c44a894188cb3d3a14ec62

        SHA256

        1a154ca2ce00c76e06ca80dd3cd9e982bf9884b05b21132e799bc2b1f502f08c

        SHA512

        1ae636cb867dcdc9338aadf071ab9eb24e103a4ab5101730f65997b97a73308b80224a0518059eac8782bd78056e59bbb9955dc5be0aaa7e3539ea809d5132c2

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\TUZKB9QQ.txt

        Filesize

        66B

        MD5

        5f45398f011789feb58219adacb25fa2

        SHA1

        efac6190b95e304038579385876a4c1ebd756670

        SHA256

        0109c85e3114ee8d7d16782fb2e9ca38e9d371b38afcd15b2d29a7b12272ed53

        SHA512

        53aa696a20a1ee9f364b748293427e2ffba530f08fefcf17ec5cbc94365754feec04e95c3eecb448c3101822c577453ec2b48ede853dd353d44cef995970c2db

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

        Filesize

        7KB

        MD5

        1ccc774193b27bdaba4f2f978d3e2878

        SHA1

        f0693689c624c17e30c02a5149d72cf3a1a4a8bf

        SHA256

        3b648c366e46a6e006e1f815df58463067ee427a75f2495eafb7b84c0ef45ba3

        SHA512

        38b58252002d1a6649643184ce2faa640a3fef11e099a8931d93c4d8262e8e99f17d9de9ab7103c6e21d335683bf21e80b4ff340aadcab0dfad656caaca5de4e

      • C:\Users\Admin\AppData\Roaming\csrss.exe

        Filesize

        900KB

        MD5

        a98d235da1eb7b1f4455e1d2d5da0092

        SHA1

        6ecbb2576af86277982f5d3b009294f91ba840fa

        SHA256

        88760232e1d64868329d6b216931353f34c6ba8254c8afaf47094682fcf33a46

        SHA512

        4a1cd0c425673d0fc012d2a93ade98b40aabd957bcb06b9f4a4d82cc90293b3e7092a67d902881c29cec3f0deb4b744e354ed58f97b82192c676f50303fcfeff

      • C:\Users\Admin\AppData\Roaming\csrss.exe

        Filesize

        640KB

        MD5

        d8ecb99173f1c279fa1c1a3179117445

        SHA1

        1d40f33333761c8bd94519386ce7ba016daf630f

        SHA256

        43b67aae67ecad58b23854c72837e3f530586300bb9a103f41fcc29ae073f181

        SHA512

        2ebe3bf7886e3e6b91aa49bdb33bd138d2d254465060d96deb5a68ab2577f8a7c1d01b170281144c24a09eb50bc979644e7294fff0eb512a0f233840e62d7aaf

      • memory/2400-144-0x00000000013A0000-0x0000000001484000-memory.dmp

        Filesize

        912KB

      • memory/2400-147-0x0000000004FB0000-0x0000000005034000-memory.dmp

        Filesize

        528KB

      • memory/2400-146-0x0000000000630000-0x0000000000640000-memory.dmp

        Filesize

        64KB

      • memory/2400-145-0x0000000000A80000-0x0000000000A9A000-memory.dmp

        Filesize

        104KB

      • memory/2520-60-0x000000002F631000-0x000000002F632000-memory.dmp

        Filesize

        4KB

      • memory/2520-64-0x0000000002070000-0x0000000002072000-memory.dmp

        Filesize

        8KB

      • memory/2520-62-0x000000007243D000-0x0000000072448000-memory.dmp

        Filesize

        44KB

      • memory/2520-130-0x000000007243D000-0x0000000072448000-memory.dmp

        Filesize

        44KB

      • memory/2548-129-0x000000007243D000-0x0000000072448000-memory.dmp

        Filesize

        44KB

      • memory/2548-65-0x00000000023F0000-0x00000000023F2000-memory.dmp

        Filesize

        8KB

      • memory/2548-1-0x000000007243D000-0x0000000072448000-memory.dmp

        Filesize

        44KB

      • memory/2548-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

        Filesize

        64KB

      • memory/2568-160-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2568-164-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2568-162-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2568-169-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2568-168-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2568-166-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2568-171-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/2568-172-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB