Analysis
-
max time kernel
114s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-04-2024 01:21
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe
Resource
win7-20240221-en
1 signatures
150 seconds
General
-
Target
2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe
-
Size
94KB
-
MD5
8934da1811cf18df3fe06760a35ac72a
-
SHA1
b2c2c45e4313b24f2fef151cfd0290807b7e81b5
-
SHA256
2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f
-
SHA512
74dbc6d02f81e39188423bde86561d31b2ec7c4748a4edc5d26438d68c14b58c070235e5c6191655b36144552f6730c9c9310dca2f3cfb516ae1a5cef1819909
-
SSDEEP
1536:xTglRuw57sWRVo9sr4h3P9MyQhhYHwfeomXYT9V:xy7XRqIA/y/hYHwG4V
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.amageo.ro - Port:
587 - Username:
[email protected] - Password:
Logistica2021 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
Processes:
resource yara_rule behavioral2/memory/2572-3-0x0000000005A40000-0x0000000005AF8000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-6-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-7-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-9-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-11-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-13-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-15-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-17-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-19-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-21-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-23-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-25-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-27-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-29-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-31-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-33-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-35-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-39-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-37-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-41-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-43-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-45-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-47-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-49-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-51-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-53-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-55-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-57-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-59-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-61-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-63-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-65-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-67-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 behavioral2/memory/2572-69-0x0000000005A40000-0x0000000005AF3000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exedescription pid Process procid_target PID 2572 set thread context of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
aspnet_compiler.exepid Process 2052 aspnet_compiler.exe 2052 aspnet_compiler.exe 2052 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exeaspnet_compiler.exedescription pid Process Token: SeDebugPrivilege 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe Token: SeDebugPrivilege 2052 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exedescription pid Process procid_target PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103 PID 2572 wrote to memory of 2052 2572 2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe"C:\Users\Admin\AppData\Local\Temp\2f55d4d56c2a89ba618c22a484adf7d4dcf4e7bb1c18dc0207403111e8926f8f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2128 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:81⤵PID:3784