Analysis

  • max time kernel
    134s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 08:02

General

  • Target

    PO OAU_DECQTRFA00541·PDF.scr.exe

  • Size

    1.0MB

  • MD5

    3294d2af361c80011932b8f7072b7f88

  • SHA1

    b18d0e7ea33e53655f762382e950778ef85dd561

  • SHA256

    566d8749e166436792dfcbb5e5514f18c9afc0e1314833ac2e3d86f37ff2030f

  • SHA512

    82ecd16ff9e7eb3a97d64c0c6436965a2da9c055bf0787b8951181909312c5a57018dbbe557f7b99c074028f451566fdd73bad92c6b38fecff27783dc87c0e4f

  • SSDEEP

    12288:n6952FCwL9s1sdVUULtfZJrXoCc27z+IWMHexsRipnF4Hx3oLbX4H8PZDN:n695Twu1yf/oy7zCOONN

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    gator3220.hostgator.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    MCgD#w!TZ505!!@@

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO OAU_DECQTRFA00541·PDF.scr.exe
    "C:\Users\Admin\AppData\Local\Temp\PO OAU_DECQTRFA00541·PDF.scr.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2660
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2660-0-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/2660-1-0x0000000000E40000-0x0000000000F46000-memory.dmp

    Filesize

    1.0MB

  • memory/2660-2-0x00000000058C0000-0x000000000596A000-memory.dmp

    Filesize

    680KB

  • memory/2660-3-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-4-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-8-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-6-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-20-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-26-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-28-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-34-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-38-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-36-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-42-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-40-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-32-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-44-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-50-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-52-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-54-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-58-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-66-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-64-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-62-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-60-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-56-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-48-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-46-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-30-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-24-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-22-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-18-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-16-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-14-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-12-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-10-0x00000000058C0000-0x0000000005964000-memory.dmp

    Filesize

    656KB

  • memory/2660-935-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/2660-936-0x0000000005980000-0x0000000005981000-memory.dmp

    Filesize

    4KB

  • memory/2660-938-0x0000000005A70000-0x0000000005ABC000-memory.dmp

    Filesize

    304KB

  • memory/2660-937-0x00000000059E0000-0x0000000005A22000-memory.dmp

    Filesize

    264KB

  • memory/2660-939-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/2660-940-0x00000000058B0000-0x00000000058C0000-memory.dmp

    Filesize

    64KB

  • memory/2660-941-0x0000000006330000-0x00000000068D4000-memory.dmp

    Filesize

    5.6MB

  • memory/2660-944-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-946-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-945-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/3576-948-0x00000000056A0000-0x0000000005706000-memory.dmp

    Filesize

    408KB

  • memory/3576-947-0x00000000055F0000-0x0000000005600000-memory.dmp

    Filesize

    64KB

  • memory/3576-949-0x00000000062E0000-0x0000000006330000-memory.dmp

    Filesize

    320KB

  • memory/3576-950-0x00000000064D0000-0x000000000656C000-memory.dmp

    Filesize

    624KB

  • memory/3576-951-0x00000000069D0000-0x0000000006A62000-memory.dmp

    Filesize

    584KB

  • memory/3576-952-0x00000000069B0000-0x00000000069BA000-memory.dmp

    Filesize

    40KB

  • memory/3576-953-0x0000000075320000-0x0000000075AD0000-memory.dmp

    Filesize

    7.7MB

  • memory/3576-954-0x00000000055F0000-0x0000000005600000-memory.dmp

    Filesize

    64KB