During the first week of July 2017, malspam activity was observed delivering AgentTesla malware, a spyware capable of key and clipboard logging, screen capture, and stealing passwords from browsers [1][2]. This threat advisory will discuss its delivery methods and traffic analysis using NetWitness Logs and Packets.

The observed delivery document (File name: document.doc) was originally uploaded to Virus Total on July 7th and is named “document.doc”. This MS Word document contains embedded and obfuscated macros recorded in VBA, which are auto-launched upon opening. This document when submitted to RSA’s pre-release What's This File service had maximum threat score.

agenttesla-wtf-1.png

As indicated below, the cleansed VBA code contained within the document uses Document_Open to auto-launch of script and then Shell to launch an executable.

agenttesla-wtf-2.png

Following the process tree, powershell.exe is called to download “filenew.exe” from findmylogs[.]com and save the payload, a malicious executable saved as “prcQE.exe” in the “\AppData\Local\Temp” folder.

agenttesla-process-tree.png

agenttesla-download-session.png

agenttesla-checksum-files.png

NetWitness packet inspection flags the following meta data from this activity.

agenttesla-navigate.png

An RSA NetWitness Endpoint (aka ECAT) agent installed on the affected client machine shows the following tracking information and machine Indicators of Compromise (IOCs).

agenttesla-ecat-tracking-ta.png

agenttesla-ecat-iioc-ta.png

After the victim is infected, AgentTesla begins outbound communications via HTTP POSTs to onlinesypoi[.]com. Highlighted fields below represent a possible signature for Agent Tesla spyware [3].

agenttesla-beaconing.png

agenttesla-navigate-2.png

The domain onlinesypoi[.]com itself was also observed delivering AgentTesla binaries.

agenttesla-sessions.png

agenttesla-process-tree-2.png

agenttesla-download-session-2.png

agenttesla-checksum-files-2.png

agenttesla-checksum-files-3.png

Scan results for those binaries can be found here and here.

All the IOC from those HTTP sessions were added to RSA FirstWatch Command and Control Domains on Live with the following meta:

  • threat.source = ‘rsa-firstwatch’
  • threat.category = ‘malspam’
  • threat.description = ‘delivery-domain’

Thanks to Kevin Stear and Prakhar Pandey for contributing to this threat advisory.

References:

  1. https://www.zscaler.com/blogs/research/agent-tesla-keylogger-delivered-using-cybersquatting
  2. https://cysinfo.com/agent-tesla-new-spyware-variant-plucked-hackers-arena/
  3. In-Depth Analysis of A New Variant of .NET Malware AgentTesla | Fortinet Blog 
Topic: