Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 13:16

General

  • Target

    BF-TL-605877001.exe

  • Size

    481KB

  • MD5

    d555da013d512f714926dd3213083e5d

  • SHA1

    25ae9c59ae5b3bfe27933981b0a68a0445b22458

  • SHA256

    e837bf6c58ee97ebdb7c3d58a733f3d527bf0150f1eb551af6707f71d54a3457

  • SHA512

    7f3ad943dbdec3c803f8664d2095add10deb9477acf8c3784411708401a7ca748969fba617a82cd212a0070ec84c061719b9d2175b7570ea68b7b51f97b590e0

  • SSDEEP

    6144:0stUW74e1KpFcqsIi3IDCIHA/lWGHalBNLrK2OgBBmdN3MVqRw6aPMGGmGlH:02UWwFZCTsG4BNSgB43MBm

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    66.29.151.236
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    moIynCqPXDmd

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 35 IoCs
  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
    "C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\fel.exe
      "C:\Users\Admin\AppData\Local\Temp\fel.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Users\Admin\AppData\Local\Temp\tmp9872.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp9872.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        PID:3020
    • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
      C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
      2⤵
        PID:4204
      • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
        C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
        2⤵
          PID:3892
        • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
          C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
          2⤵
            PID:5012
          • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
            C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3640

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BF-TL-605877001.exe.log

          Filesize

          1KB

          MD5

          c3941d9fa38f1717d5cecd7a2ca71667

          SHA1

          33b5362675383b58b4166ed9f9a61e5aa6768d2e

          SHA256

          f1ed6ff1cd3df219061e32df1c75d6f48de6484cf50e5ea7d86cd8bcfcb93256

          SHA512

          98f103ef97d32bf8c0566a6f6da5cf8d58d18f698c1b3e5bd0be0ea8462f5fe54c2e5e6b5188f2b7d8f70082ffd6745b1f7f6cab95af474e2b7eaed50a9d9c45

        • C:\Users\Admin\AppData\Local\Temp\fel.exe

          Filesize

          35KB

          MD5

          b47c31e89b4cacc864b6279983b4ffc3

          SHA1

          b082036aa2adb45f2db952d8dcd200fe766cf3cf

          SHA256

          34109344250f9884f7414b7d31de4f6627d4378e0723446fa836b18b60e8ed84

          SHA512

          d4febd99d7a9c554aa091ba2a03508bfefcd27ae33f04920865b3802cddcdb1960001acbcb5fab8cf61dc7a1427158b432ffa1c47d377e9417377635a15c994e

        • C:\Users\Admin\AppData\Local\Temp\tmp9872.tmp.exe

          Filesize

          481KB

          MD5

          3a44104fb5d035d1cd725732e94a5e8d

          SHA1

          cb3f89df88e1468bca9d5ca01d22588791884ecb

          SHA256

          dcb623cc7f3f21e92e4878c82ce79582fdf6ba1e5e0c76f19097d1496e6c4b08

          SHA512

          eebe4acc924ef0284d7303ae581d29e67f1f2c23042b3a42e37b3bccedc28d10e3370a4221a95dd07c6d930d5bfae606de3a954f625f13a0eedc2eca8921acc1

        • memory/1208-56-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-20-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-2-0x0000000002440000-0x0000000002450000-memory.dmp

          Filesize

          64KB

        • memory/1208-3-0x0000000002400000-0x000000000240A000-memory.dmp

          Filesize

          40KB

        • memory/1208-4-0x00000000055B0000-0x00000000057B0000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-5-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-6-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-8-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-10-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-12-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-14-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-16-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-18-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-60-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-22-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-24-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-26-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-28-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-30-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-32-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-34-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-36-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-38-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-40-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-42-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-44-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-46-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-48-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-50-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-52-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-62-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-0-0x0000000000090000-0x000000000010C000-memory.dmp

          Filesize

          496KB

        • memory/1208-68-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-1-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/1208-54-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-64-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-66-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-58-0x00000000055B0000-0x00000000057AB000-memory.dmp

          Filesize

          2.0MB

        • memory/1208-305-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/1208-4782-0x0000000000630000-0x0000000000631000-memory.dmp

          Filesize

          4KB

        • memory/1208-4783-0x0000000000820000-0x0000000000868000-memory.dmp

          Filesize

          288KB

        • memory/1208-4784-0x0000000000870000-0x00000000008BC000-memory.dmp

          Filesize

          304KB

        • memory/1208-4797-0x0000000006600000-0x0000000006BA4000-memory.dmp

          Filesize

          5.6MB

        • memory/1208-4807-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/2900-4800-0x0000000005760000-0x0000000005770000-memory.dmp

          Filesize

          64KB

        • memory/2900-4803-0x0000000003220000-0x0000000003226000-memory.dmp

          Filesize

          24KB

        • memory/2900-4796-0x0000000000E70000-0x0000000000E80000-memory.dmp

          Filesize

          64KB

        • memory/2900-4825-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/2900-4798-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/3020-4827-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/3020-4824-0x0000000000BD0000-0x0000000000C4C000-memory.dmp

          Filesize

          496KB

        • memory/3020-4826-0x0000000002E10000-0x0000000002E1A000-memory.dmp

          Filesize

          40KB

        • memory/3020-5242-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/3020-4833-0x0000000005E60000-0x00000000060E6000-memory.dmp

          Filesize

          2.5MB

        • memory/3020-5683-0x00000000055D0000-0x00000000055E0000-memory.dmp

          Filesize

          64KB

        • memory/3020-4828-0x00000000055D0000-0x00000000055E0000-memory.dmp

          Filesize

          64KB

        • memory/3640-4805-0x0000000000400000-0x0000000000442000-memory.dmp

          Filesize

          264KB

        • memory/3640-4810-0x0000000006E00000-0x0000000006E50000-memory.dmp

          Filesize

          320KB

        • memory/3640-4811-0x0000000006EF0000-0x0000000006F8C000-memory.dmp

          Filesize

          624KB

        • memory/3640-4829-0x0000000006F90000-0x0000000007022000-memory.dmp

          Filesize

          584KB

        • memory/3640-4830-0x0000000006E90000-0x0000000006E9A000-memory.dmp

          Filesize

          40KB

        • memory/3640-4831-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB

        • memory/3640-4832-0x0000000002E70000-0x0000000002E80000-memory.dmp

          Filesize

          64KB

        • memory/3640-4809-0x00000000056B0000-0x0000000005716000-memory.dmp

          Filesize

          408KB

        • memory/3640-4808-0x0000000002E70000-0x0000000002E80000-memory.dmp

          Filesize

          64KB

        • memory/3640-4806-0x0000000074FB0000-0x0000000075760000-memory.dmp

          Filesize

          7.7MB