Agent Tesla – Basic Analysis
Agent Tesla
A remote access trojan capable of gathering sensitive data from an infected machine, including login credentials, system details, banking information, and various personal data.
The analysis below leverages on ANY.RUN which makes behavioral analysis much easier.
File Name: 00927202305001.doc
File Size: 44.21 kb
SHA256: 6aefe0bd42c68c1a2a4294c7923939ce5f68f892a21f1606772561b6c7037ce6
Reference: hxxps://app.any.run/tasks/9ca83159-55d8-48d8-8e8c-a5e69a31edd2/
C2 Server: ftp[DOT]valvulasthermovalve[DOT]cl
Behavioral Triggers:
- Malicious file contains an embedded payload to exploit CVE-2017-11882 (MS Office RCE – Memory Corruption) –
MITRE Execution T1203 – Exploitation for client execution
Suricata Rule Trigger – ET DROP Spamhaus DROP Listed Traffic Inbound group 39
- MITRE Discovery T1012 – Query Registry
Reads the Internet Settings – HKEY_CURRENT_USER\SOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\INTERNET SETTINGS
- MITRE Discovery T1082 – System Information Discovery
Checks proxy server information
Checks supported languages
Reads the computer name
Reads the machine GUID from the registry
Reads Environment values
- Malware (damianozx.exe) was downloaded from 208.67.105[DOT]179 – MITRE Command-and-Control T1105 – Ingress Tool Transfer
Suricata Rule Trigger – ET INFO Executable Download from dotted-quad Host
Suricata Rule Trigger – ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1
Suricata Rule Trigger – ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2
Suricata Rule Trigger – ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response
- Malware damianozx.exe executes itself
MITRE Discovery T1582 – Software Discovery – Malware enumerated software installations
MITRE Credential Access T1555.003 – Credentials from Password Stores
MITRE Credential Access T1552.001 – Credentials in Files
MITRE Collection T1114.001 – Email Collection – Local Email Collection
MITRE Command-and-Control T1571 – Non-standard port – Connection on port 51645
MITRE Command-and-Control T1071 – FTP – Connects to FTP
Suricata Rule Trigger – ET MALWARE AgentTesla Exfil via FTP
YARA detections:
Rule name: SUSP_INDICATOR_RTF_MalVer_Object
Description: Detects RTF documents with non-standard version and embedding one of the objects mostly observed in exploit (e.g. CVE-2017-11882) documents.
Reference: https://github.com/ditekshen/detection
MITRE Matrix:
MITRE Execution T1203 – Exploitation for client execution
MITRE Discovery T1012 – Query Registry
MITRE Discovery T1082 – System Information Discovery
MITRE Discovery T1582 – Software Discovery – Malware enumerated software installations
MITRE Credential Access T1555.003 – Credentials from Password Stores
MITRE Credential Access T1552.001 – Credentials in Files
MITRE Collection T1114.001 – Email Collection – Local Email Collection
MITRE Command-and-Control T1105 – Ingress Tool Transfer
MITRE Command-and-Control T1571 – Non-standard port – Connection on port 51645
MITRE Command-and-Control T1071.002 – Application Layer Protocol – FTP – Connects to FTP