Analysis

  • max time kernel
    120s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2023 12:36

General

  • Target

    5119c03df1becd83ce7de22565c5fc4d.exe

  • Size

    758KB

  • MD5

    5119c03df1becd83ce7de22565c5fc4d

  • SHA1

    66bbd656f3476d4fee3c430724b1392a1bca92ac

  • SHA256

    fd4226a0d754290aa133ea1a8606846290cac4ec317a8622072d38fca80e8bbe

  • SHA512

    903c69e54df8f8f0685e1988bdaa416e210d4b75e1c0be384b38b9c6dbe647823d85ff5d55a3e2b754017d0aa61536d64959fd47e2a01a3237712ad08135ae65

  • SSDEEP

    12288:sVRQIcb2Cx71529M9tKZ424z8Q/meusGyi2QNixRFMESrROrQza5KtbGIQrOMRCV:ORtcb2Cxp52GtW4hYQ/PpGN2TXO88z30

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5119c03df1becd83ce7de22565c5fc4d.exe
    "C:\Users\Admin\AppData\Local\Temp\5119c03df1becd83ce7de22565c5fc4d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2236
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2236-17-0x0000000074160000-0x000000007484E000-memory.dmp

    Filesize

    6.9MB

  • memory/2236-2-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/2236-0-0x0000000000080000-0x0000000000144000-memory.dmp

    Filesize

    784KB

  • memory/2236-3-0x00000000004D0000-0x00000000004E2000-memory.dmp

    Filesize

    72KB

  • memory/2236-4-0x0000000074160000-0x000000007484E000-memory.dmp

    Filesize

    6.9MB

  • memory/2236-5-0x00000000006C0000-0x0000000000700000-memory.dmp

    Filesize

    256KB

  • memory/2236-6-0x0000000000600000-0x000000000060C000-memory.dmp

    Filesize

    48KB

  • memory/2236-7-0x0000000000740000-0x00000000007BE000-memory.dmp

    Filesize

    504KB

  • memory/2236-8-0x0000000002020000-0x0000000002066000-memory.dmp

    Filesize

    280KB

  • memory/2236-1-0x0000000074160000-0x000000007484E000-memory.dmp

    Filesize

    6.9MB

  • memory/2324-24-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/2324-9-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2324-12-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2324-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2324-15-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2324-11-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2324-18-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2324-20-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2324-21-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2324-22-0x0000000004E00000-0x0000000004E40000-memory.dmp

    Filesize

    256KB

  • memory/2324-23-0x00000000740E0000-0x00000000747CE000-memory.dmp

    Filesize

    6.9MB

  • memory/2324-10-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB