Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-03-2024 13:54
Static task
static1
Behavioral task
behavioral1
Sample
bb6e3f99be7215c2afe4de4e80805ddb.exe
Resource
win7-20231129-en
General
-
Target
bb6e3f99be7215c2afe4de4e80805ddb.exe
-
Size
539KB
-
MD5
bb6e3f99be7215c2afe4de4e80805ddb
-
SHA1
5409cd1c457f429457ef0600d737517bc6b2889d
-
SHA256
c38e74eaaa19fef449a03e7852599a05c831fb844813e9b0b32d7f1f73fd1fac
-
SHA512
5174c5743415349a245c4a6535ec51c8a64fa18a7a48a4a9f8b09927b72834b1bfc1f51338bd8b22a5e640c4313c2094e1b51fc6de48775597b82c69302946c2
-
SSDEEP
12288:FB6UYWgdwcqM44a5W8vHfb4JyEOc5lBT/D:FBHzcqfJfbzVc5lV/D
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
newbeginning
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2884-5-0x0000000005A60000-0x0000000005AD6000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-6-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-7-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-9-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-17-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-15-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-19-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-13-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-11-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-21-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-23-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-25-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-27-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-29-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-31-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-33-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-35-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-37-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-39-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-41-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-43-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-45-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-47-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-49-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-51-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-53-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-55-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-57-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-59-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-61-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-63-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-65-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-67-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 behavioral1/memory/2884-69-0x0000000005A60000-0x0000000005ACF000-memory.dmp family_zgrat_v1 -
AgentTesla payload 3 IoCs
resource yara_rule behavioral1/memory/952-2295-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/952-2297-0x0000000004A70000-0x0000000004AB0000-memory.dmp family_agenttesla behavioral1/memory/952-2299-0x0000000004A70000-0x0000000004AB0000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bb6e3f99be7215c2afe4de4e80805ddb.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bb6e3f99be7215c2afe4de4e80805ddb.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bb6e3f99be7215c2afe4de4e80805ddb.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2884 set thread context of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 952 bb6e3f99be7215c2afe4de4e80805ddb.exe 952 bb6e3f99be7215c2afe4de4e80805ddb.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe Token: SeDebugPrivilege 952 bb6e3f99be7215c2afe4de4e80805ddb.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 PID 2884 wrote to memory of 952 2884 bb6e3f99be7215c2afe4de4e80805ddb.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bb6e3f99be7215c2afe4de4e80805ddb.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bb6e3f99be7215c2afe4de4e80805ddb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb6e3f99be7215c2afe4de4e80805ddb.exe"C:\Users\Admin\AppData\Local\Temp\bb6e3f99be7215c2afe4de4e80805ddb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\bb6e3f99be7215c2afe4de4e80805ddb.exeC:\Users\Admin\AppData\Local\Temp\bb6e3f99be7215c2afe4de4e80805ddb.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:952
-