MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6122dce9933f03479b3d98aea0785ae26737644262ac9ee8a67cbfbf11050f13. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 13


Maldoc score: 27


Intelligence 13 IOCs YARA File information Comments

SHA256 hash: 6122dce9933f03479b3d98aea0785ae26737644262ac9ee8a67cbfbf11050f13
SHA3-384 hash: bab7f3d5fe2e01a456ceaeeabfde8fe5f34c02550aa95226f9683c19525402c1093e6c6cfe593336dfc11924c0b75609
SHA1 hash: 32597a76c5e04fa67b6199bc9817ebdb9e1b7f71
MD5 hash: eccc1d5afe2f72a48203944b1abf01a3
humanhash: north-virginia-solar-spring
File name:00001.LPCD2022.xls
Download: download sample
Signature AgentTesla
File size:38'912 bytes
First seen:2022-04-08 09:39:24 UTC
Last seen:Never
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 768:+qDZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAK1UIb82H+jEfmHGr1XKzTY:3DZ+RwPONXoRjDhIcp0fDlaGGx+cL26k
TLSH T125033EA6B291D806D94807754CE7C7E62B26FC61AF67838B32C5F71F2E75A80C913613
Reporter @abuse_ch
Tags:AgentTesla xls

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 27
OLE dump
Sections: 19

The following OLE sections have been found using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
2264 bytesDocumentSummaryInformation
3180 bytesSummaryInformation
413083 bytesWorkbook
5665 bytes_VBA_PROJECT_CUR/PROJECT
6194 bytes_VBA_PROJECT_CUR/PROJECTwm
7977 bytes_VBA_PROJECT_CUR/VBA/Sheet1
8977 bytes_VBA_PROJECT_CUR/VBA/Sheet2
9977 bytes_VBA_PROJECT_CUR/VBA/Sheet3
103582 bytes_VBA_PROJECT_CUR/VBA/ThisWorkbook
113905 bytes_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
121360 bytes_VBA_PROJECT_CUR/VBA/__SRP_0
13127 bytes_VBA_PROJECT_CUR/VBA/__SRP_1
1494 bytes_VBA_PROJECT_CUR/VBA/__SRP_2
15158 bytes_VBA_PROJECT_CUR/VBA/__SRP_3
16711 bytes_VBA_PROJECT_CUR/VBA/dir
171233 bytes_VBA_PROJECT_CUR/VBA/dogbdtbkc
182205 bytes_VBA_PROJECT_CUR/VBA/vzbprmttn
191527 bytes_VBA_PROJECT_CUR/VBA/yhrgaijdj
OLE vba
TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
Hex Stringpped.exe707065642e657865
Hex StringMSXML2.Serve4d53584d4c322e5365727665
Hex StringrXMLHTTP.6.072584d4c485454502e362e30
Hex StringUser-557365722d
Hex StringAgent4167656e74
Hex StringODB.Stream4f44422e53747265616d
Hex StringWin357696e33
Hex String2_ProcessStartup325f50726f6365737353746172747570
Hex StringProcess50726f63657373
Hex StringWScr57536372
Hex Stringipt.Shell6970742e5368656c6c
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciousWriteMay write to a file (if combined with Open)
SuspiciousSaveToFileMay create a text file
SuspiciousRunMay run an executable file or a system command
SuspiciousCreateMay execute file or a system command through WMI
SuspiciousShowWindowMay hide the application
SuspiciousCreateObjectMay create an OLE object
SuspiciousGetObjectMay get an OLE object with a running instance
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousShellMay run an executable file or a system
SuspiciousWindowsMay enumerate application windows (if combined with Shell.Application object)
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
197
Origin country :
DE DE
Mail intelligence
No data
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
00001.LPCD2022.xls
Verdict:
Malicious activity
Analysis date:
2022-04-08 21:30:07 UTC
Tags:
macros macros-on-open maldoc-19

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/vnd.ms-excel
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Sending a custom TCP request
Creating a window
–°reating synchronization primitives
DNS request
Creating a file in the %temp% directory
Using the Windows Management Instrumentation requests
Creating a process with a hidden window
Launching a process
Bypassing of proactive protection methods using Windows Management Instrumentation (WMI)
Sending a custom TCP request by exploiting the app vulnerability
Creating a process from a recently created file
Result
Verdict:
Malicious
File Type:
Legacy Excel File with Macro
Alert level:
85%
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive macros macros-on-open
Label:
Malicious
Suspicious Score:
  9.1/10
Score Malicious:
91%
Score Benign:
9%
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
InQuest Machine Learning
An InQuest machine-learning model classified this macro as potentially malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Creates processes via WMI
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with hexadecimal encoded strings
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office process drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 605526 Sample: 00001.LPCD2022.xls Startdate: 08/04/2022 Architecture: WINDOWS Score: 100 30 Found malware configuration 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus / Scanner detection for submitted sample 2->34 36 18 other signatures 2->36 6 dropped.exe 1 5 2->6         started        9 EXCEL.EXE 8 9 2->9         started        13 BINGO.exe 2->13         started        15 BINGO.exe 2->15         started        process3 dnsIp4 46 Multi AV Scanner detection for dropped file 6->46 48 Machine Learning detection for dropped file 6->48 50 Writes to foreign memory regions 6->50 54 2 other signatures 6->54 17 RegSvcs.exe 13 12 6->17         started        28 transfer.sh 144.76.136.153, 443, 49171 HETZNER-ASDE Germany 9->28 24 C:\Users\user\AppData\Local\...\dropped.exe, PE32 9->24 dropped 52 Document exploit detected (creates forbidden files) 9->52 file5 signatures6 process7 dnsIp8 26 api.telegram.org 149.154.167.220, 443, 49172, 49173 TELEGRAMRU United Kingdom 17->26 22 C:\Users\user\AppData\Roaming\...\BINGO.exe, PE32 17->22 dropped 38 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 17->38 40 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->40 42 Tries to steal Mail credentials (via file / registry access) 17->42 44 5 other signatures 17->44 file9 signatures10
Threat name:
Script-Macro.Trojan.Valyria
Status:
Malicious
First seen:
2022-04-07 09:19:27 UTC
File Type:
Document
Extracted files:
29
AV detection:
15 of 25 (60.00%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro macro_on_action
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Office loads VBA resources, possible macro or embedded object present

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Excel file xls 6122dce9933f03479b3d98aea0785ae26737644262ac9ee8a67cbfbf11050f13

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments