Resubmissions

22-05-2024 09:38

240522-lmablaag68 10

Analysis

  • max time kernel
    141s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 09:38

General

  • Target

    Pepsico RFQ_P1005712.xls

  • Size

    111KB

  • MD5

    9eba63f385b6efcc868f163cc53e5ef6

  • SHA1

    8da5ad24a8a94e035b473f82e03a57740413998d

  • SHA256

    47ee3997168e1d2f64c940453432642e7f7cea124561a40904d7d8d3b58d2b75

  • SHA512

    6c47a8bdfbc30422ab8805fb98f454ee8b71f65057e334a0ee7723a90d2e864efa44b02e98a3984f315222065002d3cb8894b99734807f78045811597207f342

  • SSDEEP

    1536:VU0BRPw/jF2gE+wxQAOhUMqTjfktX/t/qr2ml8Vvygn05kTheDm/:y0WF2F8ATjio2fVvr05ehe

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Pepsico RFQ_P1005712.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2392
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:828
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:984
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Users\Admin\AppData\Roaming\csrss.exe
        "C:\Users\Admin\AppData\Roaming\csrss.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Drops file in Windows directory
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1972
        • C:\Users\Admin\AppData\Roaming\csrss.exe
          "C:\Users\Admin\AppData\Roaming\csrss.exe"
          3⤵
          • Loads dropped DLL
          • Suspicious use of NtCreateThreadExHideFromDebugger
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
      Filesize

      128KB

      MD5

      4c5a569d641d39b42fd7e641134276dd

      SHA1

      88d248c7053c785bc0203b0e9dbb7d70bbb3486a

      SHA256

      6732367bc51a3836abc4f456a2df661d163147fabec79d3e909d60e654455c2f

      SHA512

      27f549c789505bcfe771f1f4d324768ce239dd2c86f49f3bed56be32b859ee7b27ef57c9dd89c42af5d6966802e08d7cac172f7d44fc640b90212da1b9a48276

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{D834D722-CAE0-46AE-86C5-0605F1B7CDE5}.FSD
      Filesize

      128KB

      MD5

      3d28881fcd5e0d27471c7986defab9ab

      SHA1

      b3cf9a43b6e94ee161fcc16dba72ee550a08d911

      SHA256

      ce925888b2ffb8017fc8c31341f8653b898c0e960d294bebb37e8a95ebdced20

      SHA512

      9850c34db6dac8d41da47ab2538a156ad02aad507a7b0da6308064b0585406cf529d31667c55050c13a4232d828b6cf63f2f9bbde91c150f651a3cf20f8a5bcd

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MNCIS1YI\lionisthetruekingsofthejunglewhichcomaprewithtigerbecauseoftheattitudelionalwaysliontounderstandthepoweroflion__kingofthejnglelion[1].doc
      Filesize

      34KB

      MD5

      0305665fe64e9a6f1ece3d43bc5d5112

      SHA1

      10460b71c923225d6c368a96a7c0b7058bd65b54

      SHA256

      dc579de78c6ed74c526d2f3eabc5d486dcf1a046159e5eda72b1f232e495b6f2

      SHA512

      f359b47159ecdbbbc83e76ed00295cdd279289db6333b83d03e2a111dfb26ce873d08938345fd91083df4661253a8da26972d8cb3bc9ce93ac7ff72611f07b66

    • C:\Users\Admin\AppData\Local\Temp\Cab25AD.tmp
      Filesize

      68KB

      MD5

      29f65ba8e88c063813cc50a4ea544e93

      SHA1

      05a7040d5c127e68c25d81cc51271ffb8bef3568

      SHA256

      1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

      SHA512

      e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

    • C:\Users\Admin\AppData\Local\Temp\Tar25BF.tmp
      Filesize

      177KB

      MD5

      435a9ac180383f9fa094131b173a2f7b

      SHA1

      76944ea657a9db94f9a4bef38f88c46ed4166983

      SHA256

      67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

      SHA512

      1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

    • C:\Users\Admin\AppData\Local\Temp\nseBBE1.tmp
      Filesize

      51B

      MD5

      25e25dd5339a5ffa3029882c78781ba5

      SHA1

      4a3f9570af7ac769c1ed9f3f6635610f580f25a2

      SHA256

      95d99ced3262b6abe20846c575046294e0cace752cab5ab2067c4b78982ab61b

      SHA512

      7c5ad14c5c038c871576fadd2f7ca1c04425fe7536c0e94e7817197ec43a732369b31ef42ef194c2e44b52dfb55237a3b6a5663e17b106482a7a22f1434f2bb0

    • C:\Users\Admin\AppData\Local\Temp\nseBBE1.tmp
      Filesize

      64B

      MD5

      814da453daa6269ca4ed4cd15266b28c

      SHA1

      82981f8c0d5d3ffccbf06fff867f8c3b1aaa454b

      SHA256

      791004efaa6a41452708fe5db95097b4681e4f4d386e33b8044088b8f736d743

      SHA512

      3336dbdf67c28567e9cd6a495e2e7d7e7fca21fccdff35b7c84588237829c32f69be5f733cbc3e3bf1614868a3e9e6000c5ff3116b4cc035723c37ca743cb948

    • C:\Users\Admin\AppData\Local\Temp\nseBBE1.tmp
      Filesize

      74B

      MD5

      16d513397f3c1f8334e8f3e4fc49828f

      SHA1

      4ee15afca81ca6a13af4e38240099b730d6931f0

      SHA256

      d3c781a1855c8a70f5aca88d9e2c92afffa80541334731f62caa9494aa8a0c36

      SHA512

      4a350b790fdd2fe957e9ab48d5969b217ab19fc7f93f3774f1121a5f140ff9a9eaaa8fa30e06a9ef40ad776e698c2e65a05323c3adf84271da1716e75f5183c3

    • C:\Users\Admin\AppData\Local\Temp\nsjBCA1.tmp
      Filesize

      30B

      MD5

      f15bfdebb2df02d02c8491bde1b4e9bd

      SHA1

      93bd46f57c3316c27cad2605ddf81d6c0bde9301

      SHA256

      c87f2ff45bb530577fb8856df1760edaf1060ae4ee2934b17fdd21b7d116f043

      SHA512

      1757ed4ae4d47d0c839511c18be5d75796224d4a3049e2d8853650ace2c5057c42040de6450bf90dd4969862e9ebb420cd8a34f8dd9c970779ed2e5459e8f2f1

    • C:\Users\Admin\AppData\Local\Temp\nstBC41.tmp
      Filesize

      3B

      MD5

      4e27f2226785e9abbe046fc592668860

      SHA1

      28b18a7f383131df509f7191f946a32c5a2e410c

      SHA256

      01a219245e1501fee01ce0baea8f6065ce5162cea12fa570689a07c9717be81d

      SHA512

      2a23585835bdb5db8175cab265566042282841efdcee8aaba8b9b5d466b0f165c0c5973033ce94bb9a8f07a956689247981ea07ac5a51408263e1653d9710adb

    • C:\Users\Admin\AppData\Local\Temp\nstBC41.tmp
      Filesize

      16B

      MD5

      6cc8ad9db8f0ba7f81660ccd69b64a98

      SHA1

      91dc056ad77f912e803c37ffea075118f19e7634

      SHA256

      cc88cad1427b013d4e18f53bbcf978b7d06baae78929230ef5c7ff06d2b8f03d

      SHA512

      94272e4a4b39622a108f0d11fffc37825719aa911720c9a39482198e8360cbd11fdcd5535fa765f3c8677375da930f5dfd8408c3135bddd7a5a954397c85866a

    • C:\Users\Admin\AppData\Local\Temp\nstBC41.tmp
      Filesize

      27B

      MD5

      a4fef08db3bf7402436db287f01bb2fc

      SHA1

      66c9356fcc83fdda2e04821fa06ab8bee4f26720

      SHA256

      92bbc71aa04b34f3d6666861e615244db3d3be6f1287b3947115ea9d0e98a5d7

      SHA512

      3da695803076c9b338d9fac3d9da91ac8e0f8b4fb28665ad175325684a5688e83f56bff62766d99583ea9b2a0e394ad64f4fff3fc45b3fe154e6b4026ef7a44a

    • C:\Users\Admin\AppData\Local\Temp\nstBC41.tmp
      Filesize

      60B

      MD5

      7e828655d00269fe9d73e99520061456

      SHA1

      5341e579934758bc6e25ae7b8e4fb559d8fea2ff

      SHA256

      0d1a557b0e8d85d8d78e905004b1a7037fc12d6ffa801ec4a44262ac28e4bb3c

      SHA512

      c954c3ed0038f3888cdaf33232dad08370d5204e8054a381381959bcd1bd2125807ad3488ac94d4871db5310dc8f64b721307af1fb2711c22e4860e6d11e8081

    • C:\Users\Admin\AppData\Local\Temp\nszBC12.tmp
      Filesize

      48B

      MD5

      040cc34b899dd5230d5113b5156ec5d4

      SHA1

      60a49c8b3e3f33b38c1780e8826e50d9672c5bcf

      SHA256

      454a97bbcd88c00fd8617e38fec2ebc855a608adbb751ad5ce4355f6bd171c32

      SHA512

      e6d441445f20c73e6e23203323dd5ff68ac2a74767fa69aac7c2c1b05e7bd981cf461b66c9d516dc53b4bbc32117c12e103187cfca891846b9d42ee2aa2c423d

    • C:\Users\Admin\AppData\Local\Temp\nszBC12.tmp
      Filesize

      52B

      MD5

      5d04a35d3950677049c7a0cf17e37125

      SHA1

      cafdd49a953864f83d387774b39b2657a253470f

      SHA256

      a9493973dd293917f3ebb932ab255f8cac40121707548de100d5969956bb1266

      SHA512

      c7b1afd95299c0712bdbc67f9d2714926d6ec9f71909af615affc400d8d2216ab76f6ac35057088836435de36e919507e1b25be87b07c911083f964eb67e003b

    • C:\Users\Admin\AppData\Local\Temp\nszBC62.tmp
      Filesize

      24B

      MD5

      942a0add5de9c46c9874a72eba3ce9f6

      SHA1

      c51748200f0e8ff506ca5d9878573146be220491

      SHA256

      3d42f06595afec189d9167ecf58d0da6c8294c155e9fc364d8fe8bdcdf25bc89

      SHA512

      1813eba450ea8bb385b0da7ce4b54a196df7d8b8fb8e79ee9a8161aad31ba7e9e082a337e08c5f09aa19d48a19c1d3c20596893017f350dec28bab36b1366800

    • C:\Users\Admin\AppData\Local\Temp\nszBC62.tmp
      Filesize

      56B

      MD5

      53b8f59e083aa7c1b4fe5ed372e3e7e4

      SHA1

      98782aed5619d59ed36429277fe238727387955e

      SHA256

      bc97a078a44781b51dc6a3d5c38147c918c8311459c1c3d5d272002c513a68af

      SHA512

      5ef8041026150b346839577e782a4ace6b2c9b2e3e0cc2ddd9e29dc34dbf598902e1895adf6353aaed6f56743c8d421d1dc898d188dbbaaa5bcca224e7306bb1

    • C:\Users\Admin\AppData\Local\Temp\{88CC71AE-4F3A-4D19-BC53-63CA64CBEFEB}
      Filesize

      128KB

      MD5

      2ad729af055174f561400626fcee456e

      SHA1

      4c566c90872d69daa134eb9155758aacdffe0cf5

      SHA256

      ab2b810dc6ef68986bda091b3d3ac94c8c4f30d4d5d3387e3d02099e5e07f9ef

      SHA512

      b4b9a53f2eaceca2440be069806efce82c52547109e6b7e71b46797e1d8778ae9080973033be45137ea8b6233ccd63409a6e04859bb93d361c77d45f5c585d9b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\SZZZORWW.txt
      Filesize

      70B

      MD5

      a951a27e9a2db2efd5f778df58acf6d7

      SHA1

      670d719f02261aa8e6566fc86d44e7356b841d56

      SHA256

      5016b24298fc88d1722664cb50f04bbb005c8c550f55b54b02e45a2a8a7e93a5

      SHA512

      36bd5bd8e920e9306553bac89a6c9ee645ce345987139496d5c0ca8bc7516e889b6149c77a7d638e936994a3aeea01ee261c2ad47751ef9d4d03e3cf6629a511

    • \Users\Admin\AppData\Local\Temp\nszBC11.tmp\System.dll
      Filesize

      12KB

      MD5

      cff85c549d536f651d4fb8387f1976f2

      SHA1

      d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e

      SHA256

      8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8

      SHA512

      531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88

    • \Users\Admin\AppData\Roaming\csrss.exe
      Filesize

      498KB

      MD5

      b616cc8c02b88cff3a1d36ab29673399

      SHA1

      34689314dda15bd7e84fb84e4cf09749f548bdd3

      SHA256

      cd3c4e2367d2980a9809fca28a819e6d67bbb8f03a11bd3c5de0f3ce269d7c56

      SHA512

      21ed90d8b55b780c6dfd95e5ff6aab8fcd4818a7d199160532f43630ce4d97ccfc54a5624665c7a811b4c2ee9dba16488343181ce972d1bac3ce5aa8428121a3

    • memory/828-59-0x0000000003720000-0x0000000003722000-memory.dmp
      Filesize

      8KB

    • memory/828-57-0x0000000072CCD000-0x0000000072CD8000-memory.dmp
      Filesize

      44KB

    • memory/828-55-0x000000002F321000-0x000000002F322000-memory.dmp
      Filesize

      4KB

    • memory/828-125-0x0000000072CCD000-0x0000000072CD8000-memory.dmp
      Filesize

      44KB

    • memory/2392-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2392-60-0x00000000023F0000-0x00000000023F2000-memory.dmp
      Filesize

      8KB

    • memory/2392-124-0x0000000072CCD000-0x0000000072CD8000-memory.dmp
      Filesize

      44KB

    • memory/2392-1-0x0000000072CCD000-0x0000000072CD8000-memory.dmp
      Filesize

      44KB

    • memory/2532-717-0x0000000000470000-0x00000000014D2000-memory.dmp
      Filesize

      16.4MB

    • memory/2532-718-0x0000000000470000-0x00000000004B0000-memory.dmp
      Filesize

      256KB