Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2023 16:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
PO OAU_DECQTRFA00541·PDF.scr
Resource
win7-20231023-en
windows7-x64
8 signatures
150 seconds
General
-
Target
PO OAU_DECQTRFA00541·PDF.scr
-
Size
876KB
-
MD5
db8fdd697dafaa4aeb307452d652e0ef
-
SHA1
2addcfa14726e4c3e049873f7cfe0f2d42a04923
-
SHA256
9a37e5fffbac484741276e5f1e6e3c69edb6de33844ee2d99c9ce3adcf5deca9
-
SHA512
27fe99a63ea198bdfd9cd20415b0bf5d4a607ac8351f6c4e45df2c771ab6c6f1f4e19d386dca06d548110297f88d4bf52a0ff0d0b25890c75d3feb2213ffc827
-
SSDEEP
12288:613dUDuaee2A+cOpyd3Xo9c7T2zA+ctdOdplOXTdxvbhecadhoSHwerwGdx:I1aL2LoXGjAMCkc+w
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
uymzbwhxnsbuprue - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/1072-2-0x00000000051F0000-0x0000000005298000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-4-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-5-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-7-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-9-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-11-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-13-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-15-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-17-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-19-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-21-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-23-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-25-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-27-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-29-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-31-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-33-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-35-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-37-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-39-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-41-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-43-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-45-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-47-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-49-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-51-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-53-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-55-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-57-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-59-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-61-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-63-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-65-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 behavioral2/memory/1072-67-0x00000000051F0000-0x0000000005292000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scrdescription pid process target process PID 1072 set thread context of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4428 2896 WerFault.exe aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scraspnet_compiler.exepid process 1072 PO OAU_DECQTRFA00541·PDF.scr 1072 PO OAU_DECQTRFA00541·PDF.scr 2896 aspnet_compiler.exe 2896 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scraspnet_compiler.exedescription pid process Token: SeDebugPrivilege 1072 PO OAU_DECQTRFA00541·PDF.scr Token: SeDebugPrivilege 2896 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
PO OAU_DECQTRFA00541·PDF.scrdescription pid process target process PID 1072 wrote to memory of 4140 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 4140 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 4140 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe PID 1072 wrote to memory of 2896 1072 PO OAU_DECQTRFA00541·PDF.scr aspnet_compiler.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO OAU_DECQTRFA00541·PDF.scr"C:\Users\Admin\AppData\Local\Temp\PO OAU_DECQTRFA00541·PDF.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:4140
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2896 -s 13883⤵
- Program crash
PID:4428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 2896 -ip 28961⤵PID:2644