Resubmissions

19/06/2024, 09:41

240619-ln4a3aseqn 10

19/06/2024, 09:37

240619-llwhfaxhpc 1

Analysis

  • max time kernel
    53s
  • max time network
    37s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/06/2024, 09:41

General

  • Target

    ba53e28462f5be2540824ccde6aeb615c2f3d161.eml

  • Size

    970KB

  • MD5

    fcf740695035341857f58def98e6aec7

  • SHA1

    ba53e28462f5be2540824ccde6aeb615c2f3d161

  • SHA256

    f04bcf8afdb7836f84801c68c8912f2602978faf7f5b45ba5a13309dcd49948e

  • SHA512

    6876c2ddeccadc5c60ef02fd68f1f4d98dd55085ff1ce722ed2e13c7751d0e4b845929ca6884297c8e26ba6dbb57142574f4b8ecb65475b6991c8626df64c199

  • SSDEEP

    24576:qqR2sL8XSmsdcTN7qXxWCeMFA5V3JCLbU9S5W0c7f:LLASmcc+Wr8Y+cr

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 1 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 12 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 14 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 16 IoCs
  • Suspicious use of SendNotifyMessage 10 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 59 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE
    C:\PROGRA~2\MICROS~1\Office14\OUTLOOK.EXE /eml "C:\Users\Admin\AppData\Local\Temp\ba53e28462f5be2540824ccde6aeb615c2f3d161.eml"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2408
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\0IQ11QT7\ORDER_01881371631.7z"
      2⤵
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Users\Admin\AppData\Local\Temp\7zOC91CDD66\ORDER_01881371631.exe
        "C:\Users\Admin\AppData\Local\Temp\7zOC91CDD66\ORDER_01881371631.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1548
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\7zOC91CDD66\ORDER_01881371631.exe"
          4⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2152
      • C:\Users\Admin\AppData\Local\Temp\7zOC913CD96\ORDER_01881371631.exe
        "C:\Users\Admin\AppData\Local\Temp\7zOC913CD96\ORDER_01881371631.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5936
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\7zOC913CD96\ORDER_01881371631.exe"
          4⤵
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:6036
      • C:\Users\Admin\AppData\Local\Temp\7zOC91F6AD6\ORDER_01881371631.exe
        "C:\Users\Admin\AppData\Local\Temp\7zOC91F6AD6\ORDER_01881371631.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:5904
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\7zOC91F6AD6\ORDER_01881371631.exe"
          4⤵
            PID:6108
          • C:\Users\Admin\AppData\Local\Temp\7zOC91F6AD6\ORDER_01881371631.exe
            "C:\Users\Admin\AppData\Local\Temp\7zOC91F6AD6\ORDER_01881371631.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:6116
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\7zOC91F6AD6\ORDER_01881371631.exe"
              5⤵
              • Accesses Microsoft Outlook profiles
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2852
    • C:\Users\Admin\Desktop\ORDER_01881371631.exe
      "C:\Users\Admin\Desktop\ORDER_01881371631.exe"
      1⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\Desktop\ORDER_01881371631.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_win_path
        PID:3456

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\FORMS\FRMCACHE.DAT

      Filesize

      240KB

      MD5

      1f440f32491d2d6e6af2e801ea0b2bac

      SHA1

      9a15cdd718168e077a3ea6fc47a013d573369227

      SHA256

      06356b39d0a9400990bb0c6d91bff1c4bd8a732b54f768396289bee23507c7b5

      SHA512

      e04a78adc7e7ca97becc6e5386e0474120b55ec7b08955e9490bf496b78f52bb8154baf01af60baa5fefb87e1c25df8beeed551799aeb62ef7840501ee076ea1

    • C:\Users\Admin\AppData\Local\Microsoft\Outlook\Outlook.sharing.xml.obi

      Filesize

      185B

      MD5

      bf6f4ad1ac89788b31ea7965cb3dee2b

      SHA1

      6e2818f498b61bb133cd3749c03c07936bbc50d3

      SHA256

      6687838f6aa6da40451191faabb289d73f5390acbcdc29ead5f43bfdadfa72f8

      SHA512

      64f8ebbae25898915c82c6eeff446651517fe59d25373d03cf0f7b5a5ee8b9e487440046a6db7df6a7ffa2b1229dfe0636e98ae3d74b0e7882e6825e06eaef01

    • C:\Users\Admin\AppData\Local\Microsoft\Outlook\mapisvc.inf

      Filesize

      1KB

      MD5

      48dd6cae43ce26b992c35799fcd76898

      SHA1

      8e600544df0250da7d634599ce6ee50da11c0355

      SHA256

      7bfe1f3691e2b4fb4d61fbf5e9f7782fbe49da1342dbd32201c2cc8e540dbd1a

      SHA512

      c1b9322c900f5be0ad166ddcfec9146918fb2589a17607d61490fd816602123f3af310a3e6d98a37d16000d4acbbcd599236f03c3c7f9376aeba7a489b329f31

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\0IQ11QT7\ORDER_01881371631.7z

      Filesize

      693KB

      MD5

      97452a814679502c8939ef4c47f28bb6

      SHA1

      46b5cf285fd44c185dc69b0721ded4ba4f3fb880

      SHA256

      999d75f37b6119face47f303d5bd4cf83d5c62346f355a1388038e32359ecbcd

      SHA512

      4a8d5d940e7bc6eb8143390f9b5b3956dd7079601c026556f028f9703bf04b65b19ad0bee4abeada2640945bb185a199253e4bd7d46fe5ab3207ac2ede18a12e

    • C:\Users\Admin\AppData\Local\Temp\7zOC91CDD66\ORDER_01881371631.exe

      Filesize

      1.3MB

      MD5

      1a4664b8ff72e5e2cf7c5a5aa045bcf2

      SHA1

      74ec5407a7fab5056f17db186a0b2e79c86594d2

      SHA256

      9ea02d38fe4feff7c9818062f8fd0f9ac385e73f2ca702887eaa72f50696869e

      SHA512

      0441847cb72e671b3c085f2883356fd1550f3d024c2ea49d5b0d6677884067c6065b93b9205eac20e3e19e0d2b58546ba180896064000e4730b09816647ab3e8

    • C:\Users\Admin\AppData\Local\Temp\7zOC91CDD66\ORDER_01881371631.exe:Zone.Identifier

      Filesize

      26B

      MD5

      fbccf14d504b7b2dbcb5a5bda75bd93b

      SHA1

      d59fc84cdd5217c6cf74785703655f78da6b582b

      SHA256

      eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

      SHA512

      aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

    • C:\Users\Admin\AppData\Local\Temp\autCB8A.tmp

      Filesize

      9KB

      MD5

      f6fa7da59645eaebe34ddbdc13429228

      SHA1

      181b74e0f149f30db12e1d05515a428f60c14ea7

      SHA256

      076ee17ec4a8a811dac49244e41306e9ca2a3dd2a234f0d06d46b6a64b414157

      SHA512

      4ef3ce4ad356b6ea91d36840e3baa6b9f92564f358fefbb4cdd0be1f8ff1410862fc55c2f68a5dafdf3220885192266a6d0031f99bada6c2e8c9983c0c369892

    • C:\Users\Admin\AppData\Local\Temp\exhilaratingly

      Filesize

      261KB

      MD5

      85e20c3d5e31f09f3e2dc4059192b440

      SHA1

      2affd8b00a9bd2228dd08622777fdef528d36012

      SHA256

      3c5443fc2d4c438bfb483ea71b6685d594166b79ea1e47c41c61e232e6f374fa

      SHA512

      daf39b40ab5dc150d9a67f73936ec97b4fa9c5fbc52bfb9e5caf7ce265ed8ce905624820dbf83c56fa250758d7300b7c8d6832c1dd45f2cb5babe878d2b4e027

    • C:\Users\Admin\AppData\Local\Temp\exhilaratingly

      Filesize

      261KB

      MD5

      57526393506d5a53e6a40ade71ee8af6

      SHA1

      62ea25d35a4e8dab1acd3cf7c991e26079b767a8

      SHA256

      29232b112c00397078c4e59864cd323c60227b6f2dad38c944f695926ebfb575

      SHA512

      8581543251d75918724e3c90f446678f957dd5175ccd686364217a4264d9e2bc830a773d39f9320750fb1e0999b1ced6ed79d4044a40a088688feb73559597dc

    • C:\Users\Admin\AppData\Local\Temp\proximobuccal

      Filesize

      28KB

      MD5

      3f5f6ba0a32ddc79cf7aea081629f1ab

      SHA1

      60b1e4944e7d6af94bf2c3e22742c0b02c560887

      SHA256

      70a8f39848f78d86bc80e3b5ba4bd1386391ac0e6af025d8415659fb10701304

      SHA512

      c00c8f1666834308adbd1a1d2a0a25c3d498018dd19ba8d2c3b10e9ee32819f944f7fb4e04092a60c84594c31a994cd7379cda5feb5137b888de5f9e0bfe474f

    • C:\Users\Admin\AppData\Local\Temp\{E9EF04D7-126C-4610-8834-90069D556B7B}.html

      Filesize

      6KB

      MD5

      adf3db405fe75820ba7ddc92dc3c54fb

      SHA1

      af664360e136fd5af829fd7f297eb493a2928d60

      SHA256

      4c73525d8b563d65a16dee49c4fd6af4a52852d3e8f579c0fb2f9bb1da83e476

      SHA512

      69de07622b0422d86f7960579b15b3f2e4d4b4e92c6e5fcc7e7e0b8c64075c3609aa6e5152beec13f9950ed68330939f6827df26525fc6520628226f598b7a72

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\NormalEmail.dotm

      Filesize

      19KB

      MD5

      30fbd58d7e89e1e047fd5412c1fc33f6

      SHA1

      a8f90669d291b68acaa85a3ab50e7b21e0be4d26

      SHA256

      88bd6a71f2e5dfc32ea1a9098a89583e63cb0d4980b6a18002d27f48bd90b939

      SHA512

      fc0d4bf9444bed808cbe82755f16844bed16a0bd57a3397ba9b2af2d5356c9886a747bcfe125a16f3b01b928e3e2f929f8624e1b1285febc78baeb35e288e3c4

    • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

      Filesize

      2B

      MD5

      f3b25701fe362ec84616a93a45ce9998

      SHA1

      d62636d8caec13f04e28442a0a6fa1afeb024bbb

      SHA256

      b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

      SHA512

      98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

    • memory/2152-257-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-302-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-247-0x0000000000870000-0x00000000008C4000-memory.dmp

      Filesize

      336KB

    • memory/2152-249-0x0000000000AF0000-0x0000000000B42000-memory.dmp

      Filesize

      328KB

    • memory/2152-269-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-251-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-267-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-265-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-250-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-263-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-261-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-253-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-255-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-245-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2152-259-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-275-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-299-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-309-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-307-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-306-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-303-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-246-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2152-297-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-295-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-293-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-291-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-289-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-288-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-285-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-283-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-281-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-279-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-277-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-273-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2152-271-0x0000000000AF0000-0x0000000000B3D000-memory.dmp

      Filesize

      308KB

    • memory/2408-232-0x000000007325D000-0x0000000073268000-memory.dmp

      Filesize

      44KB

    • memory/2408-201-0x000000000F7C0000-0x000000000FA38000-memory.dmp

      Filesize

      2.5MB

    • memory/2408-1-0x000000007325D000-0x0000000073268000-memory.dmp

      Filesize

      44KB

    • memory/2408-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2408-3443-0x000000007325D000-0x0000000073268000-memory.dmp

      Filesize

      44KB

    • memory/2852-2385-0x00000000004B0000-0x0000000000504000-memory.dmp

      Filesize

      336KB