Resubmissions

21-06-2024 17:47

240621-wdak4syenc 10

17-06-2024 01:02

240617-bd377swhrc 10

Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17-06-2024 01:02

General

  • Target

    19215023198d9ebe4a626113cc6c001bd4d250ebea69aa25afd483aefd4c0984.xlam

  • Size

    653KB

  • MD5

    ddfba93d516fe962fc785056189afea7

  • SHA1

    65197b03ded95c0664179c1f28637d5799ece267

  • SHA256

    19215023198d9ebe4a626113cc6c001bd4d250ebea69aa25afd483aefd4c0984

  • SHA512

    4954799467218948b955697827b98d7b9681b1608bc2472c57fa4c218a6d9f38491b7df10f60e66a69c699c8352d6a0392d059114c0c2be59e6fc254fa1e8b62

  • SSDEEP

    12288:NLnWI4DNnXcSKJ/icWmLyzuCuMeOFC0180gzLuh1Y+5NIj6nSuP3T1sHOGJ65e:F0DNXcX0cWm+zLFWdLcK+TDx3pZs

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\19215023198d9ebe4a626113cc6c001bd4d250ebea69aa25afd483aefd4c0984.xlam
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:112
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Roaming\WED.exe
      "C:\Users\Admin\AppData\Roaming\WED.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Users\Admin\AppData\Roaming\WED.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448

Network

MITRE ATT&CK Matrix ATT&CK v13

Execution

Exploitation for Client Execution

1
T1203

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\antholite
    Filesize

    261KB

    MD5

    1413a4d2d1f2b60a467939e19c77d456

    SHA1

    af312dfc21c4ab674019466d885929b135dde67f

    SHA256

    cb8eda70578f9f36c592554cb19765b28aeeaa728ef4c9e182071c20afe3228c

    SHA512

    efc6e8f6af1551d1899a56f64e6de22b86064c16bdd078fe83fb469d1619607df6172315762554676c6b982726f16e4b0ab915e15103d167687c1455e162ec12

  • \Users\Admin\AppData\Roaming\WED.exe
    Filesize

    1.1MB

    MD5

    e26a8ce5b2f2b9730cc15713a4b1d4a1

    SHA1

    258928b51ae64aa69b7f4db01a312b2fbf15017d

    SHA256

    7de764cdf6861e861ae288e21011b11350b6a502e4d6a6c9043b74b5bf0e98e2

    SHA512

    7c91cbc2ad02452c1284ec1b923b223730bef9568398ca39bbca6fd1e78a6ffaf6dd08a308047b54d37d70a554aab0539a4a5e985298ad175b4fe268f75cfd09

  • memory/112-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/112-1-0x0000000072BDD000-0x0000000072BE8000-memory.dmp
    Filesize

    44KB

  • memory/112-1057-0x0000000072BDD000-0x0000000072BE8000-memory.dmp
    Filesize

    44KB

  • memory/112-1054-0x0000000072BDD000-0x0000000072BE8000-memory.dmp
    Filesize

    44KB

  • memory/2448-55-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-49-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-23-0x0000000000C60000-0x0000000000CB2000-memory.dmp
    Filesize

    328KB

  • memory/2448-45-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-73-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-71-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-69-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-75-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-67-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-65-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-63-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-61-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-59-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-57-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-21-0x0000000000400000-0x0000000000446000-memory.dmp
    Filesize

    280KB

  • memory/2448-53-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-51-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-22-0x0000000000560000-0x00000000005B4000-memory.dmp
    Filesize

    336KB

  • memory/2448-47-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-43-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-41-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-39-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-37-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-35-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-33-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-31-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-27-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-25-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-24-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-29-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-79-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-81-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-83-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-77-0x0000000000C60000-0x0000000000CAD000-memory.dmp
    Filesize

    308KB

  • memory/2448-20-0x0000000000400000-0x0000000000446000-memory.dmp
    Filesize

    280KB

  • memory/2608-19-0x00000000001E0000-0x00000000001E4000-memory.dmp
    Filesize

    16KB