Analysis
-
max time kernel
117s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe
Resource
win10v2004-20240426-en
General
-
Target
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe
-
Size
1.1MB
-
MD5
2a2ea0683e9788d9f2c18e212b0444a2
-
SHA1
d043d37dde58ad99013d565ebd64d235b8792474
-
SHA256
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909
-
SHA512
ab9d8d9e38f61e4e101e318bebd30c4804231a83a2236ad1805be263b11b9fc85ba42d436c1bc2e2d6cf6c2a8f944c1929f490c9b6455bb63cb0f0b38ea7e437
-
SSDEEP
24576:54lavt0LkLL9IMixoEgea46xFxj4L0ynPLCGL+q9MmCS:Ikwkn9IMHea46hgPQaPCS
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral1/memory/3016-17-0x0000000000240000-0x0000000000294000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-18-0x00000000003A0000-0x00000000003F4000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-60-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-80-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-78-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-76-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-74-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-72-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-70-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-68-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-66-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-64-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-62-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-58-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-56-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-55-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-52-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-51-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-48-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-44-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-38-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-36-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-32-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-30-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-28-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-26-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-24-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-22-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-21-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-46-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-42-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-40-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 behavioral1/memory/3016-34-0x00000000003A0000-0x00000000003ED000-memory.dmp family_zgrat_v1 -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2888 set thread context of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3016 RegSvcs.exe 3016 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3016 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3016 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 PID 2888 wrote to memory of 3016 2888 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5c2809874e03591d0dfe65403871dbd58
SHA1eeebf0bd04b21739a7c41265cc77e0ee8fa9f525
SHA256377311f038ba0b54c244ddc8806ef3db045612e4a1c832a07eeb56b130b6d128
SHA5121e7ffcc45455e2f13243dfc8e3acbcad28e9b045eae81fc10c735b12a78bd397f31ae20db57a6885edfe5e455dcbdae887163f9ecba36f467e8e7f3ef103e73c