Resubmissions

12-12-2023 14:51

231212-r8a3xagec2 10

12-12-2023 14:44

231212-r376fsgdd9 10

Analysis

  • max time kernel
    71s
  • max time network
    76s
  • platform
    windows10-1703_x64
  • resource
    win10-20231025-en
  • resource tags

    arch:x64arch:x86image:win10-20231025-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12-12-2023 14:51

General

  • Target

    Zecdtuorders.exe

  • Size

    871KB

  • MD5

    7e4166e62463bf537fb9f4fefeb11b0f

  • SHA1

    1bbf554f92a484b4140eb127e926b4d493a07860

  • SHA256

    edfe3d2b49b3e5b9a133c3ee9144565f413f683a1e53af9d295d568ddfb62e0d

  • SHA512

    287b0aafe17e76e3d530fa512001b13dfaa4b513dfc30898759a9f249e79cb703ee4c075afa695f8e270039d35699cc7e462f29d957df2b1abf0f00bf0254746

  • SSDEEP

    12288:IgAhV0VWCDxtMsxaSY86xdYiditORC+k8HPCK+ooJFqgvSXikzXnN2NGtioeRJv:BMYSitORdTnAsgvdkDnNqXDM

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    198.23.221.13
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    admin2

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Zecdtuorders.exe
    "C:\Users\Admin\AppData\Local\Temp\Zecdtuorders.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Users\Admin\AppData\Local\Temp\Zecdtuorders.exe
      C:\Users\Admin\AppData\Local\Temp\Zecdtuorders.exe
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Zecdtuorders.exe.log

    Filesize

    927B

    MD5

    536cab636369af6e580d95bfdc11c573

    SHA1

    8a41a39758475ae0e08bc74f42f898ad2272aca1

    SHA256

    84012832b818435c678ed4d0a9970e9e0dc3c94d3906035fdf84330e16474626

    SHA512

    34abac8aa79bd9d889fe8ca73d91aede83307a533a513d8b8e46d5a22f22dad53a4a9557cc64c94d79e21ef3929348ca4b6ef27f6cbdf7b341f615d2f9df8fa7

  • memory/2532-936-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2532-934-0x0000000073170000-0x000000007385E000-memory.dmp

    Filesize

    6.9MB

  • memory/2532-937-0x0000000005B80000-0x0000000005B90000-memory.dmp

    Filesize

    64KB

  • memory/2532-938-0x0000000005AA0000-0x0000000005B06000-memory.dmp

    Filesize

    408KB

  • memory/2532-945-0x0000000005B80000-0x0000000005B90000-memory.dmp

    Filesize

    64KB

  • memory/2532-944-0x0000000073170000-0x000000007385E000-memory.dmp

    Filesize

    6.9MB

  • memory/2532-943-0x0000000006B60000-0x0000000006B6A000-memory.dmp

    Filesize

    40KB

  • memory/2532-942-0x0000000006BB0000-0x0000000006C42000-memory.dmp

    Filesize

    584KB

  • memory/2532-941-0x0000000006880000-0x000000000691C000-memory.dmp

    Filesize

    624KB

  • memory/2532-940-0x0000000006790000-0x00000000067E0000-memory.dmp

    Filesize

    320KB

  • memory/2820-33-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-61-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-11-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-13-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-15-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-17-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-19-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-27-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-25-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-23-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-29-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-21-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-31-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-35-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-37-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-7-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-39-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-41-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-51-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-57-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-59-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-9-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-55-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-53-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-63-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-65-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-49-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-67-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-47-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-45-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-43-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-926-0x0000000005530000-0x0000000005531000-memory.dmp

    Filesize

    4KB

  • memory/2820-927-0x0000000005770000-0x00000000057B2000-memory.dmp

    Filesize

    264KB

  • memory/2820-5-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-4-0x00000000055C0000-0x0000000005664000-memory.dmp

    Filesize

    656KB

  • memory/2820-3-0x00000000055B0000-0x00000000055C0000-memory.dmp

    Filesize

    64KB

  • memory/2820-2-0x00000000055C0000-0x000000000566A000-memory.dmp

    Filesize

    680KB

  • memory/2820-1-0x0000000073170000-0x000000007385E000-memory.dmp

    Filesize

    6.9MB

  • memory/2820-0-0x0000000000B20000-0x0000000000C00000-memory.dmp

    Filesize

    896KB

  • memory/2820-928-0x00000000057B0000-0x00000000057FC000-memory.dmp

    Filesize

    304KB

  • memory/2820-929-0x0000000006010000-0x000000000650E000-memory.dmp

    Filesize

    5.0MB

  • memory/2820-935-0x0000000073170000-0x000000007385E000-memory.dmp

    Filesize

    6.9MB