Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-10-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
Quotation Sample_398893.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quotation Sample_398893.xlsx
Resource
win10v2004-20241007-en
General
-
Target
Quotation Sample_398893.xlsx
-
Size
1.0MB
-
MD5
1fa0c01f5ce39c3040b272cc0178b526
-
SHA1
7dcc0072cda211e5af3e025335398691736f7c7d
-
SHA256
b33d9e331c5b5e6a463d3be8b0456156459983fa4889009e9ba23e355f8548e5
-
SHA512
2c686ad61500d70ebeeddc04b26bcb6301877960c2dd03fcc4f82dc8344607ee04b33cf06ab9e63e160393a407a5385991cac5ccbfe5d35b6535705bb075bc49
-
SSDEEP
24576:DsP8ORmk0aZyMRIithugFmoXo0Jf4rkL7cd1AQIRL:DW8ORlZdthugFD4rPLA9
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.hermosanairobi.com - Port:
587 - Username:
[email protected] - Password:
+efQ)lDLJF7899 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2084 EQNEDT32.EXE 7 2084 EQNEDT32.EXE -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2596 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2740 asnjouying.scr 2620 asnjouying.scr -
Loads dropped DLL 2 IoCs
pid Process 2084 EQNEDT32.EXE 2740 asnjouying.scr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asnjouying.scr Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asnjouying.scr Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asnjouying.scr -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2740 set thread context of 2620 2740 asnjouying.scr 35 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQNEDT32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asnjouying.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asnjouying.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 2084 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2832 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2596 powershell.exe 2620 asnjouying.scr 2620 asnjouying.scr -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2620 asnjouying.scr Token: SeDebugPrivilege 2596 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2832 EXCEL.EXE 2832 EXCEL.EXE 2832 EXCEL.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2740 2084 EQNEDT32.EXE 33 PID 2084 wrote to memory of 2740 2084 EQNEDT32.EXE 33 PID 2084 wrote to memory of 2740 2084 EQNEDT32.EXE 33 PID 2084 wrote to memory of 2740 2084 EQNEDT32.EXE 33 PID 2740 wrote to memory of 2596 2740 asnjouying.scr 34 PID 2740 wrote to memory of 2596 2740 asnjouying.scr 34 PID 2740 wrote to memory of 2596 2740 asnjouying.scr 34 PID 2740 wrote to memory of 2596 2740 asnjouying.scr 34 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 PID 2740 wrote to memory of 2620 2740 asnjouying.scr 35 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asnjouying.scr -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 asnjouying.scr
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Quotation Sample_398893.xlsx"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2832
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\asnjouying.scrC:\Users\Admin\AppData\Local\Temp\asnjouying.scr2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\asnjouying.scr"3⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\asnjouying.scr"C:\Users\Admin\AppData\Local\Temp\asnjouying.scr"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2620
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Exploitation for Client Execution
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
3Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD5ed4c050ce6f4a63abdf9a7cdc1627684
SHA1d4479bc370d5123714231e22e6fe798254a926e1
SHA2568871961077d7992c085a7a2464082f6c39179d14711d294ceee60a25dc50011d
SHA51280939200b0edf8aa98a22f2ee24fde503b20a22d109429c0e2470bf70326571d103c5acc4d19a9dabb28093b134e227a7f91fbbdf313e683b8b43094a771d162