Analysis
-
max time kernel
93s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/01/2024, 01:18
Static task
static1
Behavioral task
behavioral1
Sample
d3fefa3e2caa419c12cf2a1600e4c41c465bf932b0ae7c337bfa2fcf5007ae5b.exe
Resource
win7-20231215-en
General
-
Target
d3fefa3e2caa419c12cf2a1600e4c41c465bf932b0ae7c337bfa2fcf5007ae5b.exe
-
Size
1.2MB
-
MD5
bc64cfefe717bfc87f7c9f45600bfbb1
-
SHA1
ffecc2a2b387d25e178013eb66f22457ad58f83a
-
SHA256
d3fefa3e2caa419c12cf2a1600e4c41c465bf932b0ae7c337bfa2fcf5007ae5b
-
SHA512
b5645dcc166053b3b9b05fdbe2a96cd795d2df829efe67e98cb0d01826dd37f2575c50afa193bae31db88880994135a68321219576a841c2bdc43c6b3416d6de
-
SSDEEP
24576:/qDEvCTbMWu7rQYlBQcBiT6rprG8aipcUz1nDsFRbryq9EZTYI:/TvC/MTQYxsWR7aipRz4bu
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.gencoldfire.com - Port:
587 - Username:
[email protected] - Password:
GM6JIf&/R7KLPtL? - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/212-23-0x0000000005270000-0x00000000052C4000-memory.dmp family_zgrat_v1 behavioral2/memory/212-43-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-45-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-49-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-47-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-51-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-69-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-73-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-83-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-81-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-79-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-77-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-75-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-71-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-67-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-65-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-63-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-61-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-59-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-57-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-55-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-53-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-41-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-39-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-37-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-35-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-33-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-31-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-29-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-27-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-25-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-24-0x0000000005270000-0x00000000052BE000-memory.dmp family_zgrat_v1 behavioral2/memory/212-17-0x0000000005180000-0x00000000051D6000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4792 set thread context of 212 4792 Process not Found 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 212 RegSvcs.exe 212 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4792 Process not Found -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 212 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4792 wrote to memory of 212 4792 Process not Found 89 PID 4792 wrote to memory of 212 4792 Process not Found 89 PID 4792 wrote to memory of 212 4792 Process not Found 89 PID 4792 wrote to memory of 212 4792 Process not Found 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3fefa3e2caa419c12cf2a1600e4c41c465bf932b0ae7c337bfa2fcf5007ae5b.exe"C:\Users\Admin\AppData\Local\Temp\d3fefa3e2caa419c12cf2a1600e4c41c465bf932b0ae7c337bfa2fcf5007ae5b.exe"1⤵PID:4792
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\d3fefa3e2caa419c12cf2a1600e4c41c465bf932b0ae7c337bfa2fcf5007ae5b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5c39bde6ca027fb3552fd87de562ad3e6
SHA16eea4d3a636a862251821b32dcd1f97f788bbb4d
SHA25644b4b5ed0050b137092c55f6dc5d81a9dfabe3126bb29d699a70d1fc80ce9baa
SHA512013b5faea4dbd3467af931b00494ae6c9a065493b1e4ddb47b44cd29f11caef45627e90ac4d8dc300dc4bb133388e28913505b9c912bd11161687bfa0fd4d639