Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 11:55
Static task
static1
Behavioral task
behavioral1
Sample
723bccfa9d5be24b8a064f547cf1c039.exe
Resource
win7-20231023-en
General
-
Target
723bccfa9d5be24b8a064f547cf1c039.exe
-
Size
622KB
-
MD5
723bccfa9d5be24b8a064f547cf1c039
-
SHA1
87242ddbce39c582b1b38c5965b10ccc9c9551d4
-
SHA256
5dbac89a6802a5144699a6e8a4ba1b2016857f03b0e01b6680af7f223f34f22c
-
SHA512
6353ac01e91505983a58d1aeaeae578ff9c20511143520fdbc705ce52ce7b2c30935d5de6da8ef88ab2cb0852534a7ae0414e9aa965a1efe3238758ddd9ecd0f
-
SSDEEP
12288:Z3IU8S6eUd4a1hZEcIAnQe/bV60036B6hG6d1XzE/J6LaYx43Qxu:RItSAdlhjxnQe/R600KCG67X+Shxu
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2012-6-0x00000000059B0000-0x00000000059C8000-memory.dmp family_zgrat_v1 -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2012 set thread context of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1236 723bccfa9d5be24b8a064f547cf1c039.exe 1236 723bccfa9d5be24b8a064f547cf1c039.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1236 723bccfa9d5be24b8a064f547cf1c039.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104 PID 2012 wrote to memory of 1236 2012 723bccfa9d5be24b8a064f547cf1c039.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\723bccfa9d5be24b8a064f547cf1c039.exe"C:\Users\Admin\AppData\Local\Temp\723bccfa9d5be24b8a064f547cf1c039.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\723bccfa9d5be24b8a064f547cf1c039.exe"C:\Users\Admin\AppData\Local\Temp\723bccfa9d5be24b8a064f547cf1c039.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1236
-