Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-02-2024 11:19
Static task
static1
Behavioral task
behavioral1
Sample
SOMGAZ PO NO6200125011.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
SOMGAZ PO NO6200125011.exe
Resource
win10v2004-20231215-en
General
-
Target
SOMGAZ PO NO6200125011.exe
-
Size
733KB
-
MD5
1128c941c31bf5c69a05b8ea81f01f43
-
SHA1
1426e216a1ae8a787104162228ba223feb6940e3
-
SHA256
ee57b6fa1e5a3c5ef776b79f32820327bcb3fe1974eeddf65c0eb56131193397
-
SHA512
7bdb8cf37a4d6dd5554bea5f96ae072fd3d72f8f7357bfa32d09c28a9f8bb193b98398deea2e79ee539b9c3c6fc806cae8b28a5223456c442d21025dd966e68e
-
SSDEEP
12288:/qBVN+10VUZVz7NB8OhlGdVWelWIy4Y+:/qsBZVfwOhwdQxIy
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5409839916:AAEYUYZy0IhJQAm4VXi620si4okGW8FDL2w/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3000-7-0x00000000047F0000-0x0000000004864000-memory.dmp family_zgrat_v1 -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
Processes:
SOMGAZ PO NO6200125011.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOMGAZ PO NO6200125011.exe Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOMGAZ PO NO6200125011.exe Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOMGAZ PO NO6200125011.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SOMGAZ PO NO6200125011.exedescription pid process target process PID 3000 set thread context of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
SOMGAZ PO NO6200125011.exeSOMGAZ PO NO6200125011.exepowershell.exepowershell.exepid process 3000 SOMGAZ PO NO6200125011.exe 3000 SOMGAZ PO NO6200125011.exe 1140 SOMGAZ PO NO6200125011.exe 1140 SOMGAZ PO NO6200125011.exe 2664 powershell.exe 2688 powershell.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
SOMGAZ PO NO6200125011.exepid process 1140 SOMGAZ PO NO6200125011.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SOMGAZ PO NO6200125011.exeSOMGAZ PO NO6200125011.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 3000 SOMGAZ PO NO6200125011.exe Token: SeDebugPrivilege 1140 SOMGAZ PO NO6200125011.exe Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2688 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SOMGAZ PO NO6200125011.exepid process 1140 SOMGAZ PO NO6200125011.exe -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
SOMGAZ PO NO6200125011.exedescription pid process target process PID 3000 wrote to memory of 2664 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2664 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2664 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2664 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2688 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2688 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2688 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2688 3000 SOMGAZ PO NO6200125011.exe powershell.exe PID 3000 wrote to memory of 2588 3000 SOMGAZ PO NO6200125011.exe schtasks.exe PID 3000 wrote to memory of 2588 3000 SOMGAZ PO NO6200125011.exe schtasks.exe PID 3000 wrote to memory of 2588 3000 SOMGAZ PO NO6200125011.exe schtasks.exe PID 3000 wrote to memory of 2588 3000 SOMGAZ PO NO6200125011.exe schtasks.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe PID 3000 wrote to memory of 1140 3000 SOMGAZ PO NO6200125011.exe SOMGAZ PO NO6200125011.exe -
outlook_office_path 1 IoCs
Processes:
SOMGAZ PO NO6200125011.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOMGAZ PO NO6200125011.exe -
outlook_win_path 1 IoCs
Processes:
SOMGAZ PO NO6200125011.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOMGAZ PO NO6200125011.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOMGAZ PO NO6200125011.exe"C:\Users\Admin\AppData\Local\Temp\SOMGAZ PO NO6200125011.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOMGAZ PO NO6200125011.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2664 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JSCrIQqACnlzp.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JSCrIQqACnlzp" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4588.tmp"2⤵
- Creates scheduled task(s)
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\SOMGAZ PO NO6200125011.exe"C:\Users\Admin\AppData\Local\Temp\SOMGAZ PO NO6200125011.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b43f42913eabc42e497f93d42185ea3
SHA103827e10a1923644bdec4fa7f9e74e0847ff80fc
SHA2563a06ca8b7d90f20f91d755df42568780aa910fc43742feba95081c732f642afe
SHA5126ef43bdb8c3d6b1213e62aa33a8a91d897f6c8d9b62cef68bf61c2f5395f79a84fb6375d808b9870726a58c9685ec9c4072fced6ea8ee2bc8f0a4bc618895074