Analysis
-
max time kernel
26s -
max time network
31s -
platform
windows10-1703_x64 -
resource
win10-20240221-en -
resource tags
arch:x64arch:x86image:win10-20240221-enlocale:en-usos:windows10-1703-x64system -
submitted
28-03-2024 16:06
Static task
static1
General
-
Target
doc20242803125126.exe
-
Size
1.1MB
-
MD5
80b5ba36422500dfcfdc3f554b764bbe
-
SHA1
42b7867a3dc3a1a79293694dd40aa100b6c8fa61
-
SHA256
361f6fd74a8f73d2dab79c455f734490b415fc4df5dfe1063fbe8c4cfca39e90
-
SHA512
0a6d740d04d210e28b21cb953af305625a416f878552408713d25194058177b59857294f9f5025ea834a66ccbfaa3a3c144c877fc1f3af21236c3b730a2dba94
-
SSDEEP
24576:eRmJkcoQricOIQxiZY1iarshzGuISZlLa6Qjz6:LJZoQrbTFZY1iaohauInjW
Malware Config
Extracted
Protocol: smtp- Host:
sslout.de - Port:
587 - Username:
it@heizoel-menrad.de - Password:
dataset123
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
Processes:
resource yara_rule behavioral1/memory/2596-73-0x00000000050E0000-0x0000000005138000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-79-0x00000000051A0000-0x00000000051F6000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-80-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-81-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-83-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-85-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-87-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-89-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-91-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-93-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-95-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-97-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-99-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-101-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-103-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-105-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-107-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-109-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-111-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-113-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-115-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-117-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-119-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-121-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-123-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-125-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-127-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-129-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-131-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-133-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-135-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-137-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 behavioral1/memory/2596-139-0x00000000051A0000-0x00000000051F0000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 2 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
Processes:
doc20242803125126.exedescription pid process target process PID 4268 set thread context of 2596 4268 doc20242803125126.exe RegSvcs.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
RegSvcs.exepid process 2596 RegSvcs.exe 2596 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
doc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exepid process 5020 doc20242803125126.exe 4404 doc20242803125126.exe 3820 doc20242803125126.exe 1844 doc20242803125126.exe 4268 doc20242803125126.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
RegSvcs.exedescription pid process Token: SeDebugPrivilege 2596 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
doc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exepid process 5020 doc20242803125126.exe 5020 doc20242803125126.exe 4404 doc20242803125126.exe 4404 doc20242803125126.exe 3820 doc20242803125126.exe 3820 doc20242803125126.exe 1844 doc20242803125126.exe 1844 doc20242803125126.exe 4268 doc20242803125126.exe 4268 doc20242803125126.exe -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
doc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exepid process 5020 doc20242803125126.exe 5020 doc20242803125126.exe 4404 doc20242803125126.exe 4404 doc20242803125126.exe 3820 doc20242803125126.exe 3820 doc20242803125126.exe 1844 doc20242803125126.exe 1844 doc20242803125126.exe 4268 doc20242803125126.exe 4268 doc20242803125126.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
doc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exedoc20242803125126.exedescription pid process target process PID 5020 wrote to memory of 2992 5020 doc20242803125126.exe RegSvcs.exe PID 5020 wrote to memory of 2992 5020 doc20242803125126.exe RegSvcs.exe PID 5020 wrote to memory of 2992 5020 doc20242803125126.exe RegSvcs.exe PID 5020 wrote to memory of 4404 5020 doc20242803125126.exe doc20242803125126.exe PID 5020 wrote to memory of 4404 5020 doc20242803125126.exe doc20242803125126.exe PID 5020 wrote to memory of 4404 5020 doc20242803125126.exe doc20242803125126.exe PID 4404 wrote to memory of 3804 4404 doc20242803125126.exe RegSvcs.exe PID 4404 wrote to memory of 3804 4404 doc20242803125126.exe RegSvcs.exe PID 4404 wrote to memory of 3804 4404 doc20242803125126.exe RegSvcs.exe PID 4404 wrote to memory of 3820 4404 doc20242803125126.exe doc20242803125126.exe PID 4404 wrote to memory of 3820 4404 doc20242803125126.exe doc20242803125126.exe PID 4404 wrote to memory of 3820 4404 doc20242803125126.exe doc20242803125126.exe PID 3820 wrote to memory of 3980 3820 doc20242803125126.exe RegSvcs.exe PID 3820 wrote to memory of 3980 3820 doc20242803125126.exe RegSvcs.exe PID 3820 wrote to memory of 3980 3820 doc20242803125126.exe RegSvcs.exe PID 3820 wrote to memory of 1844 3820 doc20242803125126.exe doc20242803125126.exe PID 3820 wrote to memory of 1844 3820 doc20242803125126.exe doc20242803125126.exe PID 3820 wrote to memory of 1844 3820 doc20242803125126.exe doc20242803125126.exe PID 1844 wrote to memory of 2260 1844 doc20242803125126.exe RegSvcs.exe PID 1844 wrote to memory of 2260 1844 doc20242803125126.exe RegSvcs.exe PID 1844 wrote to memory of 2260 1844 doc20242803125126.exe RegSvcs.exe PID 1844 wrote to memory of 4268 1844 doc20242803125126.exe doc20242803125126.exe PID 1844 wrote to memory of 4268 1844 doc20242803125126.exe doc20242803125126.exe PID 1844 wrote to memory of 4268 1844 doc20242803125126.exe doc20242803125126.exe PID 4268 wrote to memory of 2596 4268 doc20242803125126.exe RegSvcs.exe PID 4268 wrote to memory of 2596 4268 doc20242803125126.exe RegSvcs.exe PID 4268 wrote to memory of 2596 4268 doc20242803125126.exe RegSvcs.exe PID 4268 wrote to memory of 2596 4268 doc20242803125126.exe RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"4⤵
-
C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"5⤵
-
C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\doc20242803125126.exe"6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\autC95B.tmpFilesize
267KB
MD5840b5fe74139620577e01400cdd437a2
SHA136e691008c06cffc80e8ee361518150cb5bc8138
SHA256f2668ef746437bbce0a2b3d0d6890006edb52f002c50e86326abac3b8a7095c0
SHA5121bb49c611e3a0012168932e20dea2ad2742da5ab77d571e18aeb111b7f505e75d0b0a301e98e9b25ca31647d09c8d81c0c4f42af28403b0d320773b6be4eb6b9
-
C:\Users\Admin\AppData\Local\Temp\autE020.tmpFilesize
9KB
MD591abb17ca17715609d9dcd9cf7721fff
SHA1a30a3f16c7804e30b5ab5a6f34eb77eacf018b13
SHA256a9e42a1ee6f5ca8cf28a378317f477239681bc9ecb4d0dc44cb192c84e594eae
SHA5127de43e1787bb1dd48ced6b961ab359fb4ada3a4c1c0e00eb92391b369ed8bfde223e6a34c9f465727f40307b91c43c604b2283088619eb18ea7d8aa78afd16a1
-
C:\Users\Admin\AppData\Local\Temp\fondacoMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
C:\Users\Admin\AppData\Local\Temp\snaithFilesize
29KB
MD5698010303907efcaee4ee433d75ac09d
SHA1c6f9697e2ec7a7f6baf1e68b5bf7906474042837
SHA256e97064e8fd11ee6a56e952bae66425f67206b6f38e10e8213db041a75287e7a5
SHA5128558e2259da03176161ac98037d831aa66ef99829eb814a3702ea8cad62e9547fab8dfa546ed67a4a707d702870171983276ee2f0609c9d6827dfddb60d7c69c
-
memory/2596-69-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/2596-70-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/2596-71-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/2596-72-0x0000000000400000-0x0000000000447000-memory.dmpFilesize
284KB
-
memory/2596-73-0x00000000050E0000-0x0000000005138000-memory.dmpFilesize
352KB
-
memory/2596-74-0x0000000073F90000-0x000000007467E000-memory.dmpFilesize
6.9MB
-
memory/2596-75-0x0000000005150000-0x0000000005160000-memory.dmpFilesize
64KB
-
memory/2596-76-0x0000000005150000-0x0000000005160000-memory.dmpFilesize
64KB
-
memory/2596-77-0x0000000005150000-0x0000000005160000-memory.dmpFilesize
64KB
-
memory/2596-78-0x0000000005660000-0x0000000005B5E000-memory.dmpFilesize
5.0MB
-
memory/2596-79-0x00000000051A0000-0x00000000051F6000-memory.dmpFilesize
344KB
-
memory/2596-80-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-81-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-83-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-85-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-87-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-89-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-91-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-93-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-95-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-97-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-99-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-101-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-103-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-105-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-107-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-109-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-111-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-113-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-115-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-117-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-119-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-121-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-123-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-125-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-127-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-129-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-131-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-133-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-135-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-137-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-139-0x00000000051A0000-0x00000000051F0000-memory.dmpFilesize
320KB
-
memory/2596-1210-0x0000000005360000-0x00000000053C6000-memory.dmpFilesize
408KB
-
memory/2596-1211-0x0000000006560000-0x00000000065F2000-memory.dmpFilesize
584KB
-
memory/2596-1212-0x0000000006600000-0x0000000006650000-memory.dmpFilesize
320KB
-
memory/2596-1213-0x00000000066F0000-0x000000000678C000-memory.dmpFilesize
624KB
-
memory/5020-12-0x0000000003FD0000-0x0000000003FD4000-memory.dmpFilesize
16KB