Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-03-2024 13:17

General

  • Target

    BF-TL-605877001.exe

  • Size

    481KB

  • MD5

    d555da013d512f714926dd3213083e5d

  • SHA1

    25ae9c59ae5b3bfe27933981b0a68a0445b22458

  • SHA256

    e837bf6c58ee97ebdb7c3d58a733f3d527bf0150f1eb551af6707f71d54a3457

  • SHA512

    7f3ad943dbdec3c803f8664d2095add10deb9477acf8c3784411708401a7ca748969fba617a82cd212a0070ec84c061719b9d2175b7570ea68b7b51f97b590e0

  • SSDEEP

    6144:0stUW74e1KpFcqsIi3IDCIHA/lWGHalBNLrK2OgBBmdN3MVqRw6aPMGGmGlH:02UWwFZCTsG4BNSgB43MBm

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    66.29.151.236
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    moIynCqPXDmd

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 35 IoCs
  • PureLog Stealer

    PureLog Stealer is an infostealer written in C#.

  • PureLog Stealer payload 2 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
    "C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3624
    • C:\Users\Admin\AppData\Local\Temp\fel.exe
      "C:\Users\Admin\AppData\Local\Temp\fel.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Users\Admin\AppData\Local\Temp\tmp1A0B.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp1A0B.tmp.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Users\Admin\AppData\Local\Temp\tmp1A0B.tmp.exe
          C:\Users\Admin\AppData\Local\Temp\tmp1A0B.tmp.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious use of AdjustPrivilegeToken
          PID:4848
    • C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
      C:\Users\Admin\AppData\Local\Temp\BF-TL-605877001.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\BF-TL-605877001.exe.log

    Filesize

    1KB

    MD5

    c3941d9fa38f1717d5cecd7a2ca71667

    SHA1

    33b5362675383b58b4166ed9f9a61e5aa6768d2e

    SHA256

    f1ed6ff1cd3df219061e32df1c75d6f48de6484cf50e5ea7d86cd8bcfcb93256

    SHA512

    98f103ef97d32bf8c0566a6f6da5cf8d58d18f698c1b3e5bd0be0ea8462f5fe54c2e5e6b5188f2b7d8f70082ffd6745b1f7f6cab95af474e2b7eaed50a9d9c45

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\tmp1A0B.tmp.exe.log

    Filesize

    1KB

    MD5

    435e0068bcb9090064eedccd2e18bfca

    SHA1

    9329bc444452d8ac807b085e0428b159e8eed352

    SHA256

    5721053800850afc4469bf2d079768d6d3444c6cb64394978830355ec1babdc6

    SHA512

    6c26cac18fff415ce13c12cef4656596b32d41d918c34419e39de16b27fecd4c4c912301c2293bb9c101df41ebf08a996fa26c2460c5934c5de44f01f8aab9f6

  • C:\Users\Admin\AppData\Local\Temp\fel.exe

    Filesize

    35KB

    MD5

    b47c31e89b4cacc864b6279983b4ffc3

    SHA1

    b082036aa2adb45f2db952d8dcd200fe766cf3cf

    SHA256

    34109344250f9884f7414b7d31de4f6627d4378e0723446fa836b18b60e8ed84

    SHA512

    d4febd99d7a9c554aa091ba2a03508bfefcd27ae33f04920865b3802cddcdb1960001acbcb5fab8cf61dc7a1427158b432ffa1c47d377e9417377635a15c994e

  • C:\Users\Admin\AppData\Local\Temp\tmp1A0B.tmp.exe

    Filesize

    481KB

    MD5

    3a44104fb5d035d1cd725732e94a5e8d

    SHA1

    cb3f89df88e1468bca9d5ca01d22588791884ecb

    SHA256

    dcb623cc7f3f21e92e4878c82ce79582fdf6ba1e5e0c76f19097d1496e6c4b08

    SHA512

    eebe4acc924ef0284d7303ae581d29e67f1f2c23042b3a42e37b3bccedc28d10e3370a4221a95dd07c6d930d5bfae606de3a954f625f13a0eedc2eca8921acc1

  • memory/3300-4825-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/3300-4808-0x0000000005500000-0x0000000005506000-memory.dmp

    Filesize

    24KB

  • memory/3300-4803-0x00000000055A0000-0x00000000055B0000-memory.dmp

    Filesize

    64KB

  • memory/3300-4799-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/3300-4797-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

    Filesize

    64KB

  • memory/3624-4783-0x0000000006590000-0x0000000006591000-memory.dmp

    Filesize

    4KB

  • memory/3624-4806-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/3624-15-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-17-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-19-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-9-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-23-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-25-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-27-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-29-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-31-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-33-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-35-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-37-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-39-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-41-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-43-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-45-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-47-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-49-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-51-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-53-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-55-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-57-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-59-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-61-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-63-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-65-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-67-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-69-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-265-0x0000000005A10000-0x0000000005A20000-memory.dmp

    Filesize

    64KB

  • memory/3624-0-0x0000000000F70000-0x0000000000FEC000-memory.dmp

    Filesize

    496KB

  • memory/3624-4784-0x0000000006790000-0x00000000067D8000-memory.dmp

    Filesize

    288KB

  • memory/3624-4785-0x00000000067E0000-0x000000000682C000-memory.dmp

    Filesize

    304KB

  • memory/3624-11-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-4798-0x00000000074C0000-0x0000000007A64000-memory.dmp

    Filesize

    5.6MB

  • memory/3624-21-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-7-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-13-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-5-0x0000000006360000-0x0000000006560000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-1-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/3624-6-0x0000000006360000-0x000000000655B000-memory.dmp

    Filesize

    2.0MB

  • memory/3624-2-0x0000000005A10000-0x0000000005A20000-memory.dmp

    Filesize

    64KB

  • memory/3624-3-0x00000000058E0000-0x00000000058EA000-memory.dmp

    Filesize

    40KB

  • memory/3624-4-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4308-4807-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4308-4805-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4308-5886-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4308-4809-0x00000000055F0000-0x0000000005656000-memory.dmp

    Filesize

    408KB

  • memory/4308-6154-0x0000000005570000-0x0000000005580000-memory.dmp

    Filesize

    64KB

  • memory/4308-4810-0x0000000005570000-0x0000000005580000-memory.dmp

    Filesize

    64KB

  • memory/4308-5106-0x0000000006CF0000-0x0000000006D82000-memory.dmp

    Filesize

    584KB

  • memory/4308-4828-0x0000000006B60000-0x0000000006BB0000-memory.dmp

    Filesize

    320KB

  • memory/4308-4829-0x0000000006C50000-0x0000000006CEC000-memory.dmp

    Filesize

    624KB

  • memory/4308-5110-0x0000000006BF0000-0x0000000006BFA000-memory.dmp

    Filesize

    40KB

  • memory/4404-4826-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4404-9614-0x0000000006380000-0x000000000644E000-memory.dmp

    Filesize

    824KB

  • memory/4404-4824-0x0000000005440000-0x000000000544A000-memory.dmp

    Filesize

    40KB

  • memory/4404-6422-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4404-6685-0x0000000005500000-0x0000000005510000-memory.dmp

    Filesize

    64KB

  • memory/4404-4827-0x0000000005500000-0x0000000005510000-memory.dmp

    Filesize

    64KB

  • memory/4404-9613-0x0000000006170000-0x0000000006171000-memory.dmp

    Filesize

    4KB

  • memory/4404-4830-0x0000000005E90000-0x0000000006116000-memory.dmp

    Filesize

    2.5MB

  • memory/4404-4823-0x0000000000C10000-0x0000000000C8C000-memory.dmp

    Filesize

    496KB

  • memory/4404-9620-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4848-9619-0x0000000000400000-0x00000000004A8000-memory.dmp

    Filesize

    672KB

  • memory/4848-9621-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4848-9622-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB

  • memory/4848-9623-0x0000000004E20000-0x0000000004EE4000-memory.dmp

    Filesize

    784KB

  • memory/4848-10472-0x0000000004EF0000-0x0000000004EF1000-memory.dmp

    Filesize

    4KB

  • memory/4848-10473-0x0000000005050000-0x00000000050A6000-memory.dmp

    Filesize

    344KB

  • memory/4848-10475-0x0000000074E50000-0x0000000075600000-memory.dmp

    Filesize

    7.7MB

  • memory/4848-10476-0x0000000004F90000-0x0000000004FA0000-memory.dmp

    Filesize

    64KB