Analysis

  • max time kernel
    119s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    27-04-2024 01:42

General

  • Target

    a690fdba2fd0bb532f8556e97759dea39eb2c5b2696720be6119f372b1b65730.exe

  • Size

    719KB

  • MD5

    e0d1ff659ed5cb5e88c0135f73c99294

  • SHA1

    851fef711518b2289d22b1d3649372bdbcbd65ed

  • SHA256

    a690fdba2fd0bb532f8556e97759dea39eb2c5b2696720be6119f372b1b65730

  • SHA512

    d36c01d9e8efec6b07d5d84795488ff5e37fec6be80b40d8a6ab3c82a681adbcf9eadb80ec55315fa8de2a091dec8e5f96a95d3aa5049ab93abb7292deb72d09

  • SSDEEP

    12288:7dgAGe/bZefE7bTD0JYRXRhxP5ej441r+rqsYlqAaRKLycOM9uGf1laGQg/381hX:7tB/cfcTRXRXx4lMq6eWcO0N3/W5p/7V

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.strato.de
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Oy1)8JSu_qPx(rzV_{Xu

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 28 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a690fdba2fd0bb532f8556e97759dea39eb2c5b2696720be6119f372b1b65730.exe
    "C:\Users\Admin\AppData\Local\Temp\a690fdba2fd0bb532f8556e97759dea39eb2c5b2696720be6119f372b1b65730.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\a690fdba2fd0bb532f8556e97759dea39eb2c5b2696720be6119f372b1b65730.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2620
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\aSYIVFZyl.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\aSYIVFZyl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4422.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2708
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\Tar636B.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\tmp4422.tmp

    Filesize

    1KB

    MD5

    e3713fd0322761d0567c5b86e6384d86

    SHA1

    20caa8344d57c623d16f69c4fbc4fe3d641a05cd

    SHA256

    eca1f2cf80f0262ac379f92713a11f8a88cbe277091d82914df4272006382d6f

    SHA512

    9cfc219e6988db0824c85a7831d53009d1ec3eebb103904d1e68bc63911860d33fd8bc6a6790aa7c6f555fa3a6382da8468baf7f015150ca1f57399fc8285be9

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    65f1ed0c2482e65e1b33c6c34c677d85

    SHA1

    2985147436e54b1860ee729773a82e1cb0fca0ed

    SHA256

    139bd621e9e580aa1d4e94467e16c1d324518fe30abc456be7f8d731e31bf567

    SHA512

    764aaf57f9787389af5861e21dd58d3c1cbe2e8d259ad75f933e89a5e63fabfde6eefff6ce9ad48d963b91d825ebccfad314e864fbbe596d2cdbb939edb6dae8

  • memory/2744-31-0x0000000074A30000-0x000000007511E000-memory.dmp

    Filesize

    6.9MB

  • memory/2744-1-0x0000000074A30000-0x000000007511E000-memory.dmp

    Filesize

    6.9MB

  • memory/2744-2-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB

  • memory/2744-3-0x00000000003C0000-0x00000000003D8000-memory.dmp

    Filesize

    96KB

  • memory/2744-4-0x00000000003E0000-0x00000000003EE000-memory.dmp

    Filesize

    56KB

  • memory/2744-5-0x00000000003F0000-0x0000000000404000-memory.dmp

    Filesize

    80KB

  • memory/2744-6-0x000000000A0C0000-0x000000000A14A000-memory.dmp

    Filesize

    552KB

  • memory/2744-0-0x00000000012A0000-0x0000000001356000-memory.dmp

    Filesize

    728KB

  • memory/3012-76-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-64-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-23-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3012-21-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3012-32-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3012-27-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3012-33-0x0000000000900000-0x0000000000958000-memory.dmp

    Filesize

    352KB

  • memory/3012-34-0x0000000000B10000-0x0000000000B66000-memory.dmp

    Filesize

    344KB

  • memory/3012-84-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-82-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-80-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-78-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-29-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/3012-72-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-70-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-68-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-66-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-25-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3012-62-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-58-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-56-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-54-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-50-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-48-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-46-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-42-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-40-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-36-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-74-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-60-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-52-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-44-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-39-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-35-0x0000000000B10000-0x0000000000B60000-memory.dmp

    Filesize

    320KB

  • memory/3012-30-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3012-19-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB