Analysis
-
max time kernel
138s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 01:02
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
roc8899076654hyter.exe
Resource
win7-20231215-en
9 signatures
150 seconds
General
-
Target
roc8899076654hyter.exe
-
Size
1.3MB
-
MD5
0e29a8356fc439c51c89f38bf1d87a07
-
SHA1
462c0714032110552b1fe6b6dff71654d3e8f372
-
SHA256
a07958f2f727b446e9fece662ba415f8260602dac7be53dd3a63b822290dcfd7
-
SHA512
db5e0556a8aa978526877a623e7f4beb05acd736ab42bf0a9277b793a1c6073f078e48c8fc5fd5c8163562569a314454756cffafde8b739c81fcb6959dac57fb
-
SSDEEP
24576:LAHnh+eWsN3skA4RV1Hom2KXMmHa7rT2kIYopUa5:mh+ZkldoPK8Ya7rxjq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/5108-17-0x0000000005660000-0x00000000056B4000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-20-0x00000000056F0000-0x0000000005744000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-22-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-21-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-24-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-26-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-28-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-30-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-32-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-34-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-36-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-38-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-40-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-42-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-44-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-46-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-48-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-50-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-52-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-54-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-56-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-58-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-60-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-62-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-64-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-66-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-68-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-70-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-72-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-74-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-76-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-78-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 behavioral2/memory/5108-80-0x00000000056F0000-0x000000000573D000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 33 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 5108 3028 roc8899076654hyter.exe 89 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5108 RegSvcs.exe 5108 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3028 roc8899076654hyter.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5108 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 5108 3028 roc8899076654hyter.exe 89 PID 3028 wrote to memory of 5108 3028 roc8899076654hyter.exe 89 PID 3028 wrote to memory of 5108 3028 roc8899076654hyter.exe 89 PID 3028 wrote to memory of 5108 3028 roc8899076654hyter.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\roc8899076654hyter.exe"C:\Users\Admin\AppData\Local\Temp\roc8899076654hyter.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\roc8899076654hyter.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-