Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe
Resource
win10v2004-20240426-en
General
-
Target
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe
-
Size
1.1MB
-
MD5
2a2ea0683e9788d9f2c18e212b0444a2
-
SHA1
d043d37dde58ad99013d565ebd64d235b8792474
-
SHA256
68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909
-
SHA512
ab9d8d9e38f61e4e101e318bebd30c4804231a83a2236ad1805be263b11b9fc85ba42d436c1bc2e2d6cf6c2a8f944c1929f490c9b6455bb63cb0f0b38ea7e437
-
SSDEEP
24576:54lavt0LkLL9IMixoEgea46xFxj4L0ynPLCGL+q9MmCS:Ikwkn9IMHea46hgPQaPCS
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/3752-32-0x0000000003640000-0x0000000003694000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-35-0x00000000036E0000-0x0000000003734000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-47-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-97-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-95-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-93-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-89-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-87-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-85-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-81-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-79-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-77-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-75-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-73-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-69-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-67-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-63-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-61-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-59-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-58-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-55-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-53-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-51-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-49-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-45-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-91-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-83-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-43-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-71-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-65-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-41-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-39-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 behavioral2/memory/3752-38-0x00000000036E0000-0x000000000372D000-memory.dmp family_zgrat_v1 -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 12 api.ipify.org 13 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4068 set thread context of 3752 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 87 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3752 RegSvcs.exe 3752 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3752 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3752 RegSvcs.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3788 wrote to memory of 2912 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 85 PID 3788 wrote to memory of 2912 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 85 PID 3788 wrote to memory of 2912 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 85 PID 3788 wrote to memory of 4068 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 86 PID 3788 wrote to memory of 4068 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 86 PID 3788 wrote to memory of 4068 3788 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 86 PID 4068 wrote to memory of 3752 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 87 PID 4068 wrote to memory of 3752 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 87 PID 4068 wrote to memory of 3752 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 87 PID 4068 wrote to memory of 3752 4068 68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe 87 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"2⤵PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\68ff3778004f961d30e588f8f7c66bb3b674474657d8557fac42bf90457d0909.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:3752
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5c2809874e03591d0dfe65403871dbd58
SHA1eeebf0bd04b21739a7c41265cc77e0ee8fa9f525
SHA256377311f038ba0b54c244ddc8806ef3db045612e4a1c832a07eeb56b130b6d128
SHA5121e7ffcc45455e2f13243dfc8e3acbcad28e9b045eae81fc10c735b12a78bd397f31ae20db57a6885edfe5e455dcbdae887163f9ecba36f467e8e7f3ef103e73c