Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2023 11:18

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.32352.1877.exe

  • Size

    621KB

  • MD5

    12528895f0306755c4fdee8ba97d89d1

  • SHA1

    408636fe1438ba5f210705057beaf9a746ea83f6

  • SHA256

    4dd2869a36c4b826221c8b8131503fd48d3e8871af1ba2405823947c9915de74

  • SHA512

    b139b1a7d08833490e4fa3872391a4b953e0fd97700e46315d86ac41243368b02c3de1d36621e1b9e430018867a9b0211fc48a7c9d1a68cc17af685ce18cb0c7

  • SSDEEP

    12288:L3IU8S6eUdsQKwNsP4xcI1MJwNfA/R4lPd5V18EENHSkkEDWYAj:7ItSAdsQK3I1RNfA/RwP1hENHSkkEKD

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.32352.1877.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.32352.1877.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.32352.1877.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2764
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ulsrayNTRmtgvg.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2860
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ulsrayNTRmtgvg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7B67.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2936
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp7B67.tmp

    Filesize

    1KB

    MD5

    e773ebabfd204c90df24d5ac403fac1e

    SHA1

    ae2ae54358e27f16e1d30d1e4fbd50c705dc69b2

    SHA256

    bc74f844d13e9fa254aa8ff6dde20d5bcac8fba2f65aba0603e9a9f89a02fe62

    SHA512

    240e3d7ef10c2cadfb95a4eb6deb55cce8b14d110d52aec043eff6667e921363ebfb61d07a75cea5b4fd4a401b7d2b01449ae8b9a025e63ace50f5e97195e845

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IBJYFALYYK49WID35B5I.temp

    Filesize

    7KB

    MD5

    7ede2c2d52d4690788a0217c2cbaa1c5

    SHA1

    bbfa9b96efcb27ad5fae7fc96faeaf9da0ae5c5c

    SHA256

    30b3cf91d5eccdc26e179661fccf18d6a54f716f49d4fbe2bb13ec147297129e

    SHA512

    d66129a12acb61122014a3fabb242d35c8ef21903ad2ce79abf8a437d4b5dee0882db77865329af37ce451418a18de89ca6028e57fcdfc04a3786695a8ae32ed

  • memory/2228-0-0x00000000001E0000-0x0000000000280000-memory.dmp

    Filesize

    640KB

  • memory/2228-1-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2228-2-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/2228-4-0x0000000000410000-0x0000000000418000-memory.dmp

    Filesize

    32KB

  • memory/2228-3-0x00000000006F0000-0x0000000000708000-memory.dmp

    Filesize

    96KB

  • memory/2228-5-0x0000000000920000-0x000000000092A000-memory.dmp

    Filesize

    40KB

  • memory/2228-6-0x0000000000320000-0x000000000039C000-memory.dmp

    Filesize

    496KB

  • memory/2228-7-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2228-8-0x0000000004BC0000-0x0000000004C00000-memory.dmp

    Filesize

    256KB

  • memory/2228-37-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2680-35-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2680-39-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2680-44-0x00000000742C0000-0x00000000749AE000-memory.dmp

    Filesize

    6.9MB

  • memory/2680-26-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2680-40-0x0000000004720000-0x0000000004760000-memory.dmp

    Filesize

    256KB

  • memory/2680-33-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2680-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2680-29-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2680-27-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2680-21-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2680-38-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2764-22-0x000000006EE10000-0x000000006F3BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2764-30-0x000000006EE10000-0x000000006F3BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2764-42-0x000000006EE10000-0x000000006F3BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2764-25-0x00000000029B0000-0x00000000029F0000-memory.dmp

    Filesize

    256KB

  • memory/2860-24-0x000000006EE10000-0x000000006F3BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2860-28-0x000000006EE10000-0x000000006F3BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2860-41-0x000000006EE10000-0x000000006F3BB000-memory.dmp

    Filesize

    5.7MB