| File name: | SecuriteInfo.com.Exploit.RTF-ObfsObjDat.Gen.26519.7365 |
| Full analysis: | https://app.any.run/tasks/fbe450b4-ec39-48b4-9b88-870a661cff0d |
| Verdict: | Malicious activity |
| Threats: | Agent Tesla is spyware that collects information about the actions of its victims by recording keystrokes and user interactions. It is falsely marketed as a legitimate software on the dedicated website where this malware is sold. |
| Analysis date: | August 01, 2023, 17:34:48 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/rtf |
| File info: | Rich Text Format data, version 1 |
| MD5: | 14F3F5D1FA15A84D0408683136ECF11B |
| SHA1: | A2B5C457C68E25733BB3C304921BD1C17F5DF7C8 |
| SHA256: | D0F587D98A7B30811509FCA9474B18611712DB554E7F80A72F7FF759FAE1008F |
| SSDEEP: | 48:dkHn/vp5YMUFaRdhXFA6tppFUCeD+/pgyHAQLNwMiw66MSuR/0jcO+P04ORLHAYp:dkHpOrcFXFA6ZjM9H84sAYp |
| .rtf | | | Rich Text Format (100) |
|---|
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 316 | "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding | C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE | svchost.exe | ||||||||||||
User: admin Company: Design Science, Inc. Integrity Level: MEDIUM Description: Microsoft Equation Editor Exit code: 0 Version: 00110900 Modules
| |||||||||||||||
| 360 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: WCF Generic Command for Vista Setup Exit code: 4294967295 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 684 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: AddInUtil.exe Exit code: 4294967295 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 920 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft ASP.NET State Server Exit code: 4294967295 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 1004 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Runtime Optimization Service Exit code: 4294967295 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 1036 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: EdmGen.exe Exit code: 4294967295 Version: 4.7.2558.0 Modules
| |||||||||||||||
| 1600 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: aspnet_wp.exe Exit code: 4294967295 Version: 4.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 1704 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.02558\SetupUtility.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SetupCache\v4.7.02558\SetupUtility.exe | — | word.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Framework 4.5 Setup Exit code: 3221226540 Version: 14.7.2558.0 built by: NET471REL1 Modules
| |||||||||||||||
| 1748 | "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe | word.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: jsc.exe Exit code: 0 Version: 14.7.2558.0 built by: NET471REL1 Modules
AgentTesla(PID) Process(1748) jsc.exe Protocolsmtp Hostmail.sgbumperscar.com Port587 Usernameptt-mary@sgbumperscar.com Passwordtien3012m | |||||||||||||||
| 1812 | C:\Users\admin\AppData\Roaming\word.exe | C:\Users\admin\AppData\Roaming\word.exe | EQNEDT32.EXE | ||||||||||||
User: admin Company: 自間耳骨米 Integrity Level: MEDIUM Description: 耳
至香 米鳥米陽 羽黽自九羽釆而十 考間至面米田考青老 羽非考臼自飛吾間 而香而閒至身 自足羊隻老車至骨自 至艮吾黽羊辛米 老十老麥而面至長. Exit code: 0 Version: 8.9.9.7 Modules
| |||||||||||||||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1033 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1041 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1042 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1046 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1036 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1031 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1040 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1049 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 3082 |
Value: On | |||
| (PID) Process: | (2692) WINWORD.EXE | Key: | HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages |
| Operation: | write | Name: | 1055 |
Value: On | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2692 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\CVRE89D.tmp.cvr | — | |
MD5:— | SHA256:— | |||
| 2692 | WINWORD.EXE | C:\Users\admin\AppData\Local\Temp\~$curiteInfo.com.Exploit.RTF-ObfsObjDat.Gen.26519.7365.rtf | binary | |
MD5:03D432D472BDFF1C3FA33B45077BDB80 | SHA256:98AB258B6EF0A816102FEB8E661C3A514E961C153A446DFED56E8D30103D6B81 | |||
| 316 | EQNEDT32.EXE | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BDW1XBVN\Xf3sqCGlbaOri[1].exe | executable | |
MD5:F7E6328965C8ECE80786C6A6C4770F91 | SHA256:65E3A49F9DC56443442D072363A26355F70EB9D91D16B361969FB9E904ED03EC | |||
| 316 | EQNEDT32.EXE | C:\Users\admin\AppData\Roaming\word.exe | executable | |
MD5:F7E6328965C8ECE80786C6A6C4770F91 | SHA256:65E3A49F9DC56443442D072363A26355F70EB9D91D16B361969FB9E904ED03EC | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
316 | EQNEDT32.EXE | GET | 200 | 121.52.157.123:80 | http://feedeposit.uob.edu.pk/Xf3sqCGlbaOri.exe | PK | executable | 576 Kb | suspicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
316 | EQNEDT32.EXE | 121.52.157.123:80 | feedeposit.uob.edu.pk | PERN AS Content Servie Provider, Islamabad, Pakistan | PK | suspicious |
328 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
1748 | jsc.exe | 173.231.16.76:443 | api.ipify.org | WEBNX | US | malicious |
1748 | jsc.exe | 119.17.253.214:587 | mail.sgbumperscar.com | Netnam Company | VN | malicious |
Domain | IP | Reputation |
|---|---|---|
feedeposit.uob.edu.pk |
| suspicious |
teredo.ipv6.microsoft.com |
| whitelisted |
api.ipify.org |
| shared |
mail.sgbumperscar.com |
| malicious |
PID | Process | Class | Message |
|---|---|---|---|
316 | EQNEDT32.EXE | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
1748 | jsc.exe | Successful Credential Theft Detected | STEALER [ANY.RUN] Exfiltration via SMTP (AgentTesla) |