Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe
Resource
win7-20240419-en
General
-
Target
8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe
-
Size
1.1MB
-
MD5
06388533c682f59188cf1ffbcdccf2b8
-
SHA1
07e292076b3864e15ff5f59e8c5716aa1526eba3
-
SHA256
8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3
-
SHA512
66af30850a245b50ffaba98a2669129fe7a232a6fb20020b4ca6ec58a1d2024baeeabdab8d8cf64051095907509413be9ceffcea2803a77c8ac8636c65cada13
-
SSDEEP
12288:GaHTg/Ewz5XzyNLcHu/nweVaeX2JzgskkNJckI1PHS0uBnY+ayxdyY2FCe5:UyNAOfweAPvrJI6GyxdyYg9
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
28#75@ts76&&p!!@P - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4756-4-0x0000000005230000-0x00000000052E8000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-50-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-28-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-22-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-16-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-68-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-70-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-66-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-64-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-62-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-60-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-58-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-56-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-54-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-52-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-48-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-46-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-44-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-42-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-40-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-38-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-36-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-35-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-32-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-30-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-26-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-24-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-21-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-18-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-14-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-12-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-10-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-9-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 behavioral2/memory/4756-7-0x0000000005230000-0x00000000052E3000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 47 api.ipify.org 48 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4756 set thread context of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1604 aspnet_compiler.exe 1604 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe Token: SeDebugPrivilege 1604 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99 PID 4756 wrote to memory of 1604 4756 8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe"C:\Users\Admin\AppData\Local\Temp\8fb239b0d4f35af1c3bd27a2b0934deb7e1c6dff1fcc56aa9023677f2a9993f3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1604
-