Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06-04-2024 01:18

General

  • Target

    c2fbfeaae8323cc8ca88ab7e7d2a80f4389d7d77870b560e9959fedee8b23827.exe

  • Size

    87KB

  • MD5

    54e3c76747e04cf98283167390e3f123

  • SHA1

    a3addc3808226149381201bb24926fb8cbfff167

  • SHA256

    c2fbfeaae8323cc8ca88ab7e7d2a80f4389d7d77870b560e9959fedee8b23827

  • SHA512

    576c959e486aa3b4a7f3902b27f29da9eb467b8339514f00e2fc9c83c0302b62b7778457fb54043a76e7530437836822ea7e4950b10e7783a8cd06666fd1052e

  • SSDEEP

    1536:oLQAJg6/L6iFQzXblXAorYfwJcxSTlWoJl0ovJvWR4jmft2Ib7ADUzqbD3htV:OJgsL66ykDxSTlWoJl0ovJvWR46fJb7m

Malware Config

Extracted

Family

purecrypter

C2

http://213.199.41.33/rw/Lftspwf.pdf

Extracted

Family

agenttesla

Credentials

Extracted

Family

xworm

Version

5.0

C2

91.92.241.169:5353

Mutex

XctZl0l6I2mIgS0k

Attributes
  • install_file

    USB.exe

  • telegram

    https://api.telegram.org/bot5987023205:AAFlvwKv3zD3wQ2CQAewIB6uU95uBQ25ip0/sendMessage?chat_id=5202962680

aes.plain

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect Xworm Payload 1 IoCs
  • Detect ZGRat V1 35 IoCs
  • PureCrypter

    PureCrypter is a .NET malware loader first seen in early 2021.

  • Xworm

    Xworm is a remote access trojan written in C#.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2fbfeaae8323cc8ca88ab7e7d2a80f4389d7d77870b560e9959fedee8b23827.exe
    "C:\Users\Admin\AppData\Local\Temp\c2fbfeaae8323cc8ca88ab7e7d2a80f4389d7d77870b560e9959fedee8b23827.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\wndv.exe
      "C:\Users\Admin\AppData\Local\Temp\wndv.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Local\Temp\wndv.exe
        "C:\Users\Admin\AppData\Local\Temp\wndv.exe"
        3⤵
        • Executes dropped EXE
        PID:2324
    • C:\Users\Admin\AppData\Local\Temp\c2fbfeaae8323cc8ca88ab7e7d2a80f4389d7d77870b560e9959fedee8b23827.exe
      "C:\Users\Admin\AppData\Local\Temp\c2fbfeaae8323cc8ca88ab7e7d2a80f4389d7d77870b560e9959fedee8b23827.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\wndv.exe

    Filesize

    72KB

    MD5

    d9733d347b86d9809f36df294655852a

    SHA1

    293993e8248ad27cf2a3f161bf3cfd64fb176a1c

    SHA256

    38249d02586ebbfae84907ee61da7694c834828461228dc0fd3ad8c61ace30b7

    SHA512

    76a69e6dfe5729f825b0e6a25643dab1bc5a7a515b3a638268d5b1fda8171637c766647ac9b17b8c14982f5998a78cb14d7be4b4afd218544c7d5987b5ab95cb

  • memory/2028-6510-0x00000000004F0000-0x0000000000530000-memory.dmp

    Filesize

    256KB

  • memory/2028-5998-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2028-9824-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2028-9810-0x0000000001300000-0x0000000001354000-memory.dmp

    Filesize

    336KB

  • memory/2028-9809-0x0000000000E70000-0x0000000000ECC000-memory.dmp

    Filesize

    368KB

  • memory/2028-9808-0x00000000003B0000-0x00000000003B1000-memory.dmp

    Filesize

    4KB

  • memory/2028-4896-0x0000000001360000-0x0000000001374000-memory.dmp

    Filesize

    80KB

  • memory/2028-4899-0x00000000004F0000-0x0000000000530000-memory.dmp

    Filesize

    256KB

  • memory/2028-4898-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2028-4924-0x0000000006FC0000-0x00000000071E0000-memory.dmp

    Filesize

    2.1MB

  • memory/2324-9829-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2324-9828-0x0000000000400000-0x0000000000410000-memory.dmp

    Filesize

    64KB

  • memory/2440-4921-0x0000000000080000-0x00000000000C0000-memory.dmp

    Filesize

    256KB

  • memory/2440-4923-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2440-6824-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/3028-25-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-4795-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/3028-35-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-31-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-37-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-43-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-45-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-41-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-51-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-53-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-49-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-55-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-57-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-47-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-59-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-61-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-63-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-39-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-65-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-27-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-67-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-33-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-4885-0x0000000000570000-0x00000000005B0000-memory.dmp

    Filesize

    256KB

  • memory/3028-4886-0x0000000000400000-0x0000000000401000-memory.dmp

    Filesize

    4KB

  • memory/3028-4888-0x0000000000BC0000-0x0000000000C0C000-memory.dmp

    Filesize

    304KB

  • memory/3028-4887-0x0000000005420000-0x0000000005492000-memory.dmp

    Filesize

    456KB

  • memory/3028-29-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-0-0x0000000000A10000-0x0000000000A28000-memory.dmp

    Filesize

    96KB

  • memory/3028-23-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-19-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-4897-0x0000000005170000-0x00000000051C4000-memory.dmp

    Filesize

    336KB

  • memory/3028-4922-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB

  • memory/3028-21-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-17-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-15-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-13-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-11-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-9-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-7-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-5-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-4-0x0000000006F00000-0x0000000007130000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-3-0x0000000006F00000-0x0000000007136000-memory.dmp

    Filesize

    2.2MB

  • memory/3028-2-0x0000000000570000-0x00000000005B0000-memory.dmp

    Filesize

    256KB

  • memory/3028-1-0x00000000744C0000-0x0000000074BAE000-memory.dmp

    Filesize

    6.9MB