Analysis

  • max time kernel
    144s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    06/06/2024, 14:57

General

  • Target

    Swift Advice 75,608$ USD.xls

  • Size

    279KB

  • MD5

    b806f1868f3144102f73f43868d8b031

  • SHA1

    cc98fcdd285bb0f935a0593776f6c6182faf7044

  • SHA256

    36828e8ba8e39939e864288010d554c1a098a89f414b5ad8b52e97169122630a

  • SHA512

    90acc08125ca194c70286fba432f5145e8bead5abb8cff700ac2c5bb954966d3daa29d04a24e91b20000382e60bf5fe5d854e97e366d2cf692f76acf9cb0868b

  • SSDEEP

    6144:3qFzL5LIT47HmPWNBjZpXIoVvneEJ28+B3f1S6D+Hx605p:3qFzu4LmPU/rdeo28+Bt7L8p

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Drops startup file 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Swift Advice 75,608$ USD.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2368
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2156
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Roaming\IGCC.exe
        "C:\Users\Admin\AppData\Roaming\IGCC.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\AppData\Local\directory\name.exe
          "C:\Users\Admin\AppData\Roaming\IGCC.exe"
          3⤵
          • Drops startup file
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:2312
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Users\Admin\AppData\Roaming\IGCC.exe"
            4⤵
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:692

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{30607FC2-D7E5-4237-B1B8-3E4428D071C5}.FSD

      Filesize

      128KB

      MD5

      2c8ae30fa214d0ffd54709242661078a

      SHA1

      e4d677faf58a5aaac112caf38683d78f734566b7

      SHA256

      0b0a72c0a1b3830a5a24cb35db17ebecc4d087bea20ded101c7003120454765b

      SHA512

      670b2fb4e467ddb40088b28801abf87ded76c2aeae679e2da574f868a7e764b294f202f28aaed307544a73ca87ee01a747cdc3caf278c3ea0493f2a2d98cffdd

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

      Filesize

      128KB

      MD5

      dfc879420c44207206b3ab4ddc796296

      SHA1

      ec8237d61b9e8c3416288b71bb5473319bf7f494

      SHA256

      3b09f52d9bd1f3d89ea3c60f2852ff7bf24640ea9d5cc166678e375e263993c6

      SHA512

      0849269ef8a201622cdcb93c6599cb04505ab49592e7156caf664fc28f7876a02d3d93013fb97799df5e7e8f13bbd45d04a7d238801a09bf61868381feceab5b

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{5EEC2077-6287-4259-82F8-BC26B5302D8A}.FSD

      Filesize

      128KB

      MD5

      1535c8a7a919ee02a9f50a7136d9a01d

      SHA1

      29815ba8d9c976ca6e95f6db4df3b5cc9e0fc0b5

      SHA256

      e58e68ef1623134aaf454cc4876c349509f4b56d2d373b91c411cd0cf8447d93

      SHA512

      4176f9c68e5604797c5ed410669bbb3db955c660818b916d31d9cc7956ca6523b6ae82c36820d2b1e6f663493877ad3a4125d666102065bfa4bc219d729862c5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FQ3FCCBI\interestedanglesayingsheismostbeautifulwomeneverseenwindersessionlionsawaysgettingsuchandinsterestedthnigeverytimetoget___forstvibeeverywh[1].doc

      Filesize

      80KB

      MD5

      2ae556f4c5d9590b352ad8d26fdee537

      SHA1

      249031d15a31318f33373cbcff2bff389561ba47

      SHA256

      a1d6b5a9fe07c48611d197320ade782c6c06a32e7f7a14f90da78df150483399

      SHA512

      025586e3568472d8e1959a201233f1a9a92ecd858d8d903754d05c31c4e5dadd033f1f972a8ef1fc1ead95e628b257faccfa93f43bf24341f59c7996d67a0ffa

    • C:\Users\Admin\AppData\Local\Temp\camellin

      Filesize

      236KB

      MD5

      51b40dd83583fea3de44c6d917ec1168

      SHA1

      229ffac32085b9291255bd8a8e3e463b55c816bf

      SHA256

      ead5f91aee87543ea50fdce3fd9aefa04633b0e4fde9795280685fae23a73c27

      SHA512

      b750ae1d73d02c702d646d430d64641d2f425558866e65634ddc6f1c53ed326aa66c10dd9633723e2adc230a529cd75bd6f4c05be31fc986fc99de3ab9b412e6

    • C:\Users\Admin\AppData\Local\Temp\{5F7FC6C6-88DE-48EA-B1EF-A2E8387EA880}

      Filesize

      128KB

      MD5

      31f627d619f8b8730e09a485dbbf82c5

      SHA1

      b81545f2bd3c0268bd99c36f880ad91ece5f6edc

      SHA256

      c3c0baf469bb32ec2303b9f5eb6d7a58cccc59a46610ce8d71869a6ef9290466

      SHA512

      d425ffdb3115061bd8307c15254831c9791368758c2baab0de1e80d348cbc7ca4c004a4dc0b77e18e9b0c4663c45add49cc4a8c899edd83aa35cb674f5e3294b

    • C:\Users\Admin\AppData\Roaming\IGCC.exe

      Filesize

      1.0MB

      MD5

      29b2b081df5861fed9651766f37b7738

      SHA1

      656957b9e2b270b59b3750cb90978e496d9177fe

      SHA256

      e7f83d43899e14d39467f1c25170cc0215bda6c7e99986285b6833642654d03a

      SHA512

      828edb2157a3f293f92563729e17292310f525a9e4d0f66ed491dacc0f1058a85ec9bf5466de1dc98712ae0686eed4fb8b356bfa8df1e47b5ca9d205561dac5f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I1EEDMDW.txt

      Filesize

      73B

      MD5

      5991eb720cf39e3662fa95cfb7b62c68

      SHA1

      fccbc3667d18eceeeb6eedf9b52d1451dc61ae2f

      SHA256

      725a85ca6c061dc27bf6cb611af7993b0d137b1c8650b50714197d9cce006c80

      SHA512

      ea950809a5530a0cc2153b9d83e62cfe7ddb334a0bef777df981edafde491ad6f1e744ba3ffe87ec5b0f23289da9e5d8d87455272fc01597776a47f5365309c8

    • memory/692-128-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/692-129-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/692-130-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/2368-9-0x0000000001D20000-0x0000000001D22000-memory.dmp

      Filesize

      8KB

    • memory/2368-1-0x000000007222D000-0x0000000072238000-memory.dmp

      Filesize

      44KB

    • memory/2368-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2368-146-0x000000007222D000-0x0000000072238000-memory.dmp

      Filesize

      44KB

    • memory/2792-8-0x0000000003670000-0x0000000003672000-memory.dmp

      Filesize

      8KB

    • memory/2792-6-0x000000007222D000-0x0000000072238000-memory.dmp

      Filesize

      44KB

    • memory/2792-4-0x000000002F601000-0x000000002F602000-memory.dmp

      Filesize

      4KB

    • memory/2792-147-0x000000007222D000-0x0000000072238000-memory.dmp

      Filesize

      44KB