Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
12-12-2023 13:21
Static task
static1
Behavioral task
behavioral1
Sample
Balance payment.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
Balance payment.exe
Resource
win10v2004-20231130-en
General
-
Target
Balance payment.exe
-
Size
614KB
-
MD5
c76751eb111c227d587f5aff012df2fc
-
SHA1
89069a18e42fc15da8d221893dbadef9715ce5c8
-
SHA256
3f479de77fd65ff82d89c44b941aedd81d9afe93093699e40ba82b02e058719a
-
SHA512
39b7642c99bace5f1a1577a58cdb702fb384dbabeff28e9044a373b4f1e4c8a05e672c52e4ac21d16503afec5ec2f6656506a73901d8233c620f3110be6d827e
-
SSDEEP
12288:z3IU8S6eUdSTThn7IDPAbXopeOBA2TiE20XpMaqzIH+YOL:DItSAduhI0bXoVwEIamDH
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.vrlogistic.com - Port:
587 - Username:
[email protected] - Password:
@dmin@123 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2220-3-0x00000000004E0000-0x00000000004F8000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2952504676-3105837840-1406404655-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 2672 2220 Balance payment.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2220 Balance payment.exe 2220 Balance payment.exe 2220 Balance payment.exe 2220 Balance payment.exe 2220 Balance payment.exe 2220 Balance payment.exe 2220 Balance payment.exe 2924 powershell.exe 2412 powershell.exe 2672 RegSvcs.exe 2672 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2220 Balance payment.exe Token: SeDebugPrivilege 2924 powershell.exe Token: SeDebugPrivilege 2412 powershell.exe Token: SeDebugPrivilege 2672 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2924 2220 Balance payment.exe 28 PID 2220 wrote to memory of 2924 2220 Balance payment.exe 28 PID 2220 wrote to memory of 2924 2220 Balance payment.exe 28 PID 2220 wrote to memory of 2924 2220 Balance payment.exe 28 PID 2220 wrote to memory of 2412 2220 Balance payment.exe 30 PID 2220 wrote to memory of 2412 2220 Balance payment.exe 30 PID 2220 wrote to memory of 2412 2220 Balance payment.exe 30 PID 2220 wrote to memory of 2412 2220 Balance payment.exe 30 PID 2220 wrote to memory of 2124 2220 Balance payment.exe 32 PID 2220 wrote to memory of 2124 2220 Balance payment.exe 32 PID 2220 wrote to memory of 2124 2220 Balance payment.exe 32 PID 2220 wrote to memory of 2124 2220 Balance payment.exe 32 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34 PID 2220 wrote to memory of 2672 2220 Balance payment.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Balance payment.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2924
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uCxRFk.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2412
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uCxRFk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC081.tmp"2⤵
- Creates scheduled task(s)
PID:2124
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56e969c29d3850c957e1e01ff0dffd9c2
SHA11714a357fb90c57953a113e0a78d9a1d8bded6a0
SHA2560bd289c15bf8323c9b0ad5805495efbe9303c9e8316d68d872f6337ee649fe6e
SHA512203c0d80ed59275208c0e860c7a43ed3721dc79f272948b2212db7803dfa94448b9492d0ba540b8c885e12e05d89c3cd7e0107009d2dbfaaf0b0f9a663d23004
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD54e6ec5abd072c68219a9cb6df95debf4
SHA1d8e020520d61fd038aa4357f37d018f2b0336946
SHA2563723c4fa4afa395fa2f91002d9b6cfc3e9441432ca2fd5887b4a87d8d315fca0
SHA512bdc185bdb7bd4973ccad0476cca54ba59c986eb6f7d77b5e609f85f6d2174ad760295335835246028fed67b8608574ef9de5127b2f7bde13f64ba8477a306245