MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 f37a0441c66222c49723f8feae71cdce91423549228a852fb24a99fcb80c5e41. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AgentTesla


Vendor detections: 12


Maldoc score: 27


Intelligence 12 IOCs YARA File information Comments

SHA256 hash: f37a0441c66222c49723f8feae71cdce91423549228a852fb24a99fcb80c5e41
SHA3-384 hash: b8fadf25115d23dcdc9d9ab488be75eecb67a9f146f9403ffa7cd6ef875a251d8c0bebbf49e3cca8b7295f49d1f3b1bf
SHA1 hash: 4d33deee3a5e7c8af93c74e925b0e297eebef78b
MD5 hash: f0c826a16c6b0f2780e4d0f086ae4a3b
humanhash: missouri-jupiter-pasta-early
File name:00023GHS2022.xls
Download: download sample
Signature AgentTesla
File size:38'912 bytes
First seen:2022-04-08 08:54:49 UTC
Last seen:Never
File type:Excel file xls
MIME type:application/vnd.ms-excel
ssdeep 768:TtqDZ+RwPONXoRjDhIcp0fDlaGGx+cL26nAK1UIb8FDEHY5D2OiMWP2MIfv:TkDZ+RwPONXoRjDhIcp0fDlaGGx+cL2x
TLSH T187032EA27291D806D94807754CE7CBE63B26FC12AF67834B3285F71F2E75AC09A13617
Reporter abuse_ch
Tags:AgentTesla xls

Office OLE Information


This malware samples appears to be an Office document. The following table provides more information about this document using oletools and oledump.

OLE id
Maldoc score: 27
OLE dump

MalwareBazaar was able to identify 19 sections in this file using oledump:

Section IDSection sizeSection name
1114 bytesCompObj
2264 bytesDocumentSummaryInformation
3180 bytesSummaryInformation
413083 bytesWorkbook
5657 bytes_VBA_PROJECT_CUR/PROJECT
6194 bytes_VBA_PROJECT_CUR/PROJECTwm
7977 bytes_VBA_PROJECT_CUR/VBA/Sheet1
8977 bytes_VBA_PROJECT_CUR/VBA/Sheet2
9977 bytes_VBA_PROJECT_CUR/VBA/Sheet3
103557 bytes_VBA_PROJECT_CUR/VBA/ThisWorkbook
113927 bytes_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
121360 bytes_VBA_PROJECT_CUR/VBA/__SRP_0
13125 bytes_VBA_PROJECT_CUR/VBA/__SRP_1
1494 bytes_VBA_PROJECT_CUR/VBA/__SRP_2
15158 bytes_VBA_PROJECT_CUR/VBA/__SRP_3
16712 bytes_VBA_PROJECT_CUR/VBA/dir
171236 bytes_VBA_PROJECT_CUR/VBA/gxzuccmup
181539 bytes_VBA_PROJECT_CUR/VBA/owrjraelg
192208 bytes_VBA_PROJECT_CUR/VBA/vkxubcquz
OLE vba

MalwareBazaar was able to extract and deobfuscate VBA script(s) the following information from OLE objects embedded in this file using olevba:

TypeKeywordDescription
AutoExecWorkbook_OpenRuns when the Excel Workbook is opened
Hex Stringdroppe64726f707065
Hex Stringd.exe642e657865
Hex StringMSXML2.ServerXMLHTTP4d53584d4c322e536572766572584d4c48545450
Hex String.6.02e362e30
Hex Stringser-Agent7365722d4167656e74
Hex StringADODB.Stre41444f44422e53747265
Hex StringWScript.Sh575363726970742e5368
Hex StringWin32_57696e33325f
Hex StringProcessStartup50726f6365737353746172747570
SuspiciousEnvironMay read system environment variables
SuspiciousOpenMay open a file
SuspiciousWriteMay write to a file (if combined with Open)
SuspiciousSaveToFileMay create a text file
SuspiciousRunMay run an executable file or a system command
SuspiciousCreateMay execute file or a system command through WMI
SuspiciousShowWindowMay hide the application
SuspiciousCreateObjectMay create an OLE object
SuspiciousGetObjectMay get an OLE object with a running instance
SuspiciousChrMay attempt to obfuscate specific strings (use option --deobf to deobfuscate)
SuspiciousWindowsMay enumerate application windows (if combined with Shell.Application object)
SuspiciousMSXML2.ServerXMLHTTPMay download files from the Internet
SuspiciousHex StringsHex-encoded strings were detected, may be used to obfuscate strings (option --decode to see all)

Intelligence


File Origin
# of uploads :
1
# of downloads :
183
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
00023GHS2022.xls
Verdict:
Suspicious activity
Analysis date:
2022-04-08 22:55:22 UTC
Tags:
macros macros-on-open

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
File type:
application/vnd.ms-excel
Has a screenshot:
False
Contains macros:
True
Result
Verdict:
Malware
Maliciousness:

Behaviour
Searching for the window
Creating a window
Сreating synchronization primitives
DNS request
Creating a file in the %temp% directory
Using the Windows Management Instrumentation requests
Creating a process with a hidden window
Bypassing of proactive protection methods using Windows Management Instrumentation (WMI)
Sending a custom TCP request by exploiting the app vulnerability
Creating a process from a recently created file
Result
Verdict:
Malicious
File Type:
Legacy Excel File with Macro
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-vm evasive macros macros-on-open
Label:
Malicious
Suspicious Score:
9.0/10
Score Malicious:
91%
Score Benign:
9%
Result
Verdict:
MALICIOUS
Details
Macro with Startup Hook
Detected macro logic that will automatically execute on document open. Most malware contains some execution hook.
Macro Contains Suspicious String
Detected a macro with a suspicious string. Suspicious strings include privileged function calls, obfuscations, odd registry keys, etc...
InQuest Machine Learning
An InQuest machine-learning model classified this macro as potentially malicious.
Result
Threat name:
AgentTesla
Detection:
malicious
Classification:
troj.spyw.expl.evad
Score:
100 / 100
Signature
.NET source code contains potential unpacker
.NET source code contains very large array initializations
Allocates memory in foreign processes
Antivirus / Scanner detection for submitted sample
Creates processes via WMI
Document contains an embedded VBA macro which may execute processes
Document contains an embedded VBA macro with suspicious strings
Document contains an embedded VBA with functions possibly related to ADO stream file operations
Document contains an embedded VBA with functions possibly related to HTTP operations
Document contains an embedded VBA with hexadecimal encoded strings
Document exploit detected (creates forbidden files)
Document exploit detected (drops PE files)
Found malware configuration
Hides that the sample has been downloaded from the Internet (zone.identifier)
Injects a PE file into a foreign processes
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Office process drops PE file
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Sigma detected: Bad Opsec Defaults Sacrificial Processes With Improper Arguments
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Yara detected AgentTesla
Yara detected AntiVM3
Yara detected Telegram RAT
Behaviour
Behavior Graph:
behaviorgraph top1 signatures2 2 Behavior Graph ID: 605480 Sample: 00023GHS2022.xls Startdate: 08/04/2022 Architecture: WINDOWS Score: 100 30 Found malware configuration 2->30 32 Malicious sample detected (through community Yara rule) 2->32 34 Antivirus / Scanner detection for submitted sample 2->34 36 18 other signatures 2->36 6 dropped.exe 1 5 2->6         started        9 EXCEL.EXE 8 9 2->9         started        13 Frank.exe 2->13         started        15 Frank.exe 2->15         started        process3 dnsIp4 46 Multi AV Scanner detection for dropped file 6->46 48 Machine Learning detection for dropped file 6->48 50 Writes to foreign memory regions 6->50 54 2 other signatures 6->54 17 RegSvcs.exe 13 4 6->17         started        28 transfer.sh 144.76.136.153, 443, 49171 HETZNER-ASDE Germany 9->28 24 C:\Users\user\AppData\Local\...\dropped.exe, PE32 9->24 dropped 52 Document exploit detected (creates forbidden files) 9->52 file5 signatures6 process7 dnsIp8 26 api.telegram.org 149.154.167.220, 443, 49172, 49173 TELEGRAMRU United Kingdom 17->26 22 C:\Users\user\AppData\Roaming\...\Frank.exe, PE32 17->22 dropped 38 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 17->38 40 Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines) 17->40 42 Hides that the sample has been downloaded from the Internet (zone.identifier) 17->42 44 Installs a global keyboard hook 17->44 file9 signatures10
Threat name:
Script-Macro.Trojan.Valyria
Status:
Malicious
First seen:
2022-04-07 10:17:59 UTC
File Type:
Document
Extracted files:
29
AV detection:
21 of 41 (51.22%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  8/10
Tags:
macro macro_on_action
Behaviour
Checks processor information in registry
Enumerates system info in registry
Modifies Internet Explorer settings
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Office loads VBA resources, possible macro or embedded object present
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Malspam

AgentTesla

Excel file xls f37a0441c66222c49723f8feae71cdce91423549228a852fb24a99fcb80c5e41

(this sample)

  
Delivery method
Distributed via e-mail attachment

Comments