Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe
Resource
win7-20240419-en
General
-
Target
8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe
-
Size
1.1MB
-
MD5
06388533c682f59188cf1ffbcdccf2b8
-
SHA1
07e292076b3864e15ff5f59e8c5716aa1526eba3
-
SHA256
8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3
-
SHA512
66af30850a245b50ffaba98a2669129fe7a232a6fb20020b4ca6ec58a1d2024baeeabdab8d8cf64051095907509413be9ceffcea2803a77c8ac8636c65cada13
-
SSDEEP
12288:GaHTg/Ewz5XzyNLcHu/nweVaeX2JzgskkNJckI1PHS0uBnY+ayxdyY2FCe5:UyNAOfweAPvrJI6GyxdyYg9
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
28#75@ts76&&p!!@P - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2392-4-0x0000000004A80000-0x0000000004B38000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-17-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-5-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-6-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-28-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-52-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-8-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-10-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-12-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-14-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-20-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-36-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-68-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-66-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-64-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-62-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-60-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-58-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-56-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-54-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-50-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-48-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-46-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-44-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-42-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-40-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-38-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-34-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-32-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-30-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-26-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-24-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-22-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 behavioral1/memory/2392-18-0x0000000004A80000-0x0000000004B33000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 2 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2392 set thread context of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 1424 aspnet_compiler.exe 1424 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe Token: SeDebugPrivilege 1424 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1424 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2392 wrote to memory of 1188 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 30 PID 2392 wrote to memory of 1188 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 30 PID 2392 wrote to memory of 1188 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 30 PID 2392 wrote to memory of 1188 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 30 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31 PID 2392 wrote to memory of 1424 2392 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe"C:\Users\Admin\AppData\Local\Temp\8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵PID:1188
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1424
-