Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 12:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
DHL Delivery Report·PDF.scr.exe
Resource
win7-20240221-en
8 signatures
150 seconds
General
-
Target
DHL Delivery Report·PDF.scr.exe
-
Size
2.6MB
-
MD5
fb9f3eb16de0b085e745a9e98d8e05be
-
SHA1
691c8b593919359517c042ec8d54f92c816bca88
-
SHA256
413252bf1fb09a2b8d3fc1342c93fd63049b74cc651fa06630289e7c07e8a084
-
SHA512
7dc615bf17d6a59c121e6ccd3f2d51fa624f760056b949efd5bb801e570cd38ff6002853eb86c23cba81dc3a09e2c69f947759537d725220699554184a169ca8
-
SSDEEP
49152:7vcXEh5t9aPOBEVqEtKN0GXKq3cr/iIOLBbHJdcD4w8k:GEzt9aPO+oXtcr/iISrcD4w8k
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
nhqhzgdvsrkoldrr
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
nhqhzgdvsrkoldrr - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1344-5-0x0000000006FF0000-0x00000000071EA000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-8-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-9-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-11-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-13-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-15-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-17-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-19-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-21-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-23-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-25-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-27-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-29-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-31-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-33-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-35-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-37-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-39-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-41-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-43-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-45-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-47-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-49-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-51-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-53-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-55-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-57-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-59-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-61-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-63-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-65-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-67-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-69-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 behavioral2/memory/1344-71-0x0000000006FF0000-0x00000000071E4000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1344 DHL Delivery Report·PDF.scr.exe 1344 DHL Delivery Report·PDF.scr.exe 4236 cvtres.exe 4236 cvtres.exe 4236 cvtres.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1344 DHL Delivery Report·PDF.scr.exe Token: SeDebugPrivilege 4236 cvtres.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4236 cvtres.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1344 wrote to memory of 3828 1344 DHL Delivery Report·PDF.scr.exe 110 PID 1344 wrote to memory of 3828 1344 DHL Delivery Report·PDF.scr.exe 110 PID 1344 wrote to memory of 3828 1344 DHL Delivery Report·PDF.scr.exe 110 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111 PID 1344 wrote to memory of 4236 1344 DHL Delivery Report·PDF.scr.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL Delivery Report·PDF.scr.exe"C:\Users\Admin\AppData\Local\Temp\DHL Delivery Report·PDF.scr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe2⤵PID:3828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3536 --field-trial-handle=2304,i,6987730730348465820,3913273227385401271,262144 --variations-seed-version /prefetch:81⤵PID:3748