Analysis
-
max time kernel
136s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2024 01:05
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe
Resource
win7-20240215-en
11 signatures
150 seconds
General
-
Target
4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe
-
Size
1.3MB
-
MD5
f3e163fd0641aadcd1e323d2b919978f
-
SHA1
f695b5f39601d021df7e32e5381988ea1ecfe8d4
-
SHA256
4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c
-
SHA512
92a5b6fca2355e8d1777ef0c946b08c0ae96485a438e19c464407932d2c05e613ea382d35fd57da9111bc32a3ba9f2f1c054d7e8e785bf0d35510cb4c7236fe0
-
SSDEEP
24576:b4lavt0LkLL9IMixoEgeaZd3oC1SeXnZmZq9MmCS:ukwkn9IMHeaZS2ZWaPCS
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/4836-16-0x0000000002720000-0x0000000002774000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-19-0x0000000002B10000-0x0000000002B62000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-29-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-77-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-80-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-75-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-73-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-71-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-69-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-67-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-65-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-61-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-59-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-57-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-55-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-53-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-51-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-49-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-45-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-43-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-41-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-39-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-37-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-35-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-33-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-31-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-27-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-25-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-23-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-21-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-20-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-63-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 behavioral2/memory/4836-47-0x0000000002B10000-0x0000000002B5D000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1344 set thread context of 4836 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 86 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2488 1344 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4836 RegSvcs.exe 4836 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4836 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4836 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 86 PID 1344 wrote to memory of 4836 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 86 PID 1344 wrote to memory of 4836 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 86 PID 1344 wrote to memory of 4836 1344 4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe"C:\Users\Admin\AppData\Local\Temp\4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\4e932715ec5b21877a99b2adafd60d69dab8ddf8fe47601230b25911703db66c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1344 -s 7882⤵
- Program crash
PID:2488
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1344 -ip 13441⤵PID:1552