Analysis
-
max time kernel
136s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 03:40
Static task
static1
Behavioral task
behavioral1
Sample
Mt103.exe
Resource
win7-20240221-en
General
-
Target
Mt103.exe
-
Size
1.2MB
-
MD5
488b62ebafa8cf690c5bbc6654b90371
-
SHA1
f823d4862173d5e9f8745a31bc6620839126e6bb
-
SHA256
d30a0a4160b520aa94e2aacbc0f016d1f31a3168130b5d83c0ed3356eff4439b
-
SHA512
20f05e5de74cfe36a6d7ffc6903ed29f25f29c606e90c1d8e98f0a3e0cdc2f4e78211591d89d07f32f90cbafc6644c14e4a3faad58d2417624841c2b31506806
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8a6EBlHDZKcW:ETvC/MTQYxsWR7a6EBlHDZKc
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/3700-18-0x0000000004F20000-0x0000000004F74000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-21-0x0000000005030000-0x0000000005082000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-28-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-58-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-82-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-80-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-76-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-74-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-72-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-70-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-68-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-66-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-64-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-62-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-56-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-54-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-52-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-50-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-48-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-46-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-44-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-42-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-40-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-38-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-36-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-34-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-78-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-32-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-30-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-60-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-26-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-24-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 behavioral2/memory/3700-23-0x0000000005030000-0x000000000507D000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 3700 2692 Mt103.exe 86 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3700 RegSvcs.exe 3700 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2692 Mt103.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3700 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2692 Mt103.exe 2692 Mt103.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2692 Mt103.exe 2692 Mt103.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2692 wrote to memory of 3700 2692 Mt103.exe 86 PID 2692 wrote to memory of 3700 2692 Mt103.exe 86 PID 2692 wrote to memory of 3700 2692 Mt103.exe 86 PID 2692 wrote to memory of 3700 2692 Mt103.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mt103.exe"C:\Users\Admin\AppData\Local\Temp\Mt103.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Mt103.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD55f3af2273e242e1c9e41da8da9e620e7
SHA1988d95dfa28a4ceec57b0011d4a8514554b5fcc1
SHA256c41aca818739b0ddeb57afd092dca6277ad03df2adaeb714f072865bed5b1b26
SHA512e632c5bdf505118f770944d201da47b289c7e53517c395d66e2f5b2d717be8a7d67bdd760af1735e6ad1dce03225bfbc0b2e3c7073eb8b7bc77c4db5c1df262a