Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2023, 16:28 UTC

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.12978.exe

  • Size

    638KB

  • MD5

    ebb74a0fae5bf676cc2db601c2524ece

  • SHA1

    53194206f72983e5cdc408a885c8b549c395e286

  • SHA256

    f3e9ff06f04b6f3fce67e3ae02f89eb6f006ae95391105703abded87bc53f362

  • SHA512

    b98cdaf7b00d19ccb074939d8b1a378937e41b9f38219de88c1166ef7643687341df8c72b6159cd59084b4db1a0fbf15ae91bebce8043bbceeabe8f287410ec2

  • SSDEEP

    12288:LkBgOWP6i9oGpby1sTr55RxD0yaxc0q64ZKNWqAzLuMC2jDTDPGNnjl:gCMGpSsTr55R90yaSF64wNWxzaV2jD3G

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.precise.co.in
  • Port:
    587
  • Username:
    manjeet.singh@precise.co.in
  • Password:
    Singh@2022$
  • Email To:
    anuradha.c@springandsummer.lk

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.12978.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.12978.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2188
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.12978.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2580
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\kqLNrgBFwWv.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2716
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kqLNrgBFwWv" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEEF.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2740
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpEEF.tmp

    Filesize

    1KB

    MD5

    63318dc0a9af347052509b6aed36012f

    SHA1

    cfe087630202549c7982f713ee095c9db51864e1

    SHA256

    581987ff10c717b591e0637a8f677dfbb616626675005ec0ea2ea48c194ee7f1

    SHA512

    84a6cc95203c8842c690fbcaac48301bb5552fb78bc02654011791e11edc802a35547279e7213c4d2dbf8348a9036d0b83b9bee9998d3b0b9309debedf45b1a3

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VDJH8RMVX34G73CJ7YLT.temp

    Filesize

    7KB

    MD5

    1604c96cea9c600a5b2b08855bcbb012

    SHA1

    e2d889395314682926d0aebfed5a166ff157092a

    SHA256

    f5565be00067df83dc68ba6897be059a5afd09646a539044177daee5340c17e7

    SHA512

    d286475e7ec7437d75a3f58b9c3c8f929290dbd3cfef912585ba1c75aaa499a7e0518fea31d5d326fba07ca3b6b1564f247045ec02a9a41064c9af6345ba5e0d

  • memory/2188-8-0x0000000004A10000-0x0000000004A50000-memory.dmp

    Filesize

    256KB

  • memory/2188-2-0x0000000004A10000-0x0000000004A50000-memory.dmp

    Filesize

    256KB

  • memory/2188-4-0x00000000001C0000-0x00000000001C8000-memory.dmp

    Filesize

    32KB

  • memory/2188-5-0x0000000000210000-0x000000000021A000-memory.dmp

    Filesize

    40KB

  • memory/2188-6-0x0000000005140000-0x00000000051BC000-memory.dmp

    Filesize

    496KB

  • memory/2188-7-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB

  • memory/2188-38-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB

  • memory/2188-3-0x00000000001F0000-0x0000000000208000-memory.dmp

    Filesize

    96KB

  • memory/2188-1-0x0000000074190000-0x000000007487E000-memory.dmp

    Filesize

    6.9MB

  • memory/2188-0-0x0000000000C30000-0x0000000000CD4000-memory.dmp

    Filesize

    656KB

  • memory/2580-45-0x000000006F020000-0x000000006F5CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-23-0x000000006F020000-0x000000006F5CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-43-0x0000000002100000-0x0000000002140000-memory.dmp

    Filesize

    256KB

  • memory/2580-21-0x000000006F020000-0x000000006F5CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2580-28-0x0000000002100000-0x0000000002140000-memory.dmp

    Filesize

    256KB

  • memory/2656-37-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-27-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-25-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-31-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-33-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2656-35-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-48-0x00000000047E0000-0x0000000004820000-memory.dmp

    Filesize

    256KB

  • memory/2656-29-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-40-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2656-41-0x0000000072E90000-0x000000007357E000-memory.dmp

    Filesize

    6.9MB

  • memory/2656-42-0x00000000047E0000-0x0000000004820000-memory.dmp

    Filesize

    256KB

  • memory/2656-47-0x0000000072E90000-0x000000007357E000-memory.dmp

    Filesize

    6.9MB

  • memory/2716-22-0x000000006F020000-0x000000006F5CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2716-44-0x000000006F020000-0x000000006F5CB000-memory.dmp

    Filesize

    5.7MB

  • memory/2716-24-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

  • memory/2716-26-0x0000000002670000-0x00000000026B0000-memory.dmp

    Filesize

    256KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.