Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    09-05-2024 01:54

General

  • Target

    b48a1be74fa295306d499815bfac2071feee2573c226758f75287d667514f83d.exe

  • Size

    1.3MB

  • MD5

    59d981ed9028d3247ef3fca52e62b117

  • SHA1

    e3e3d5233b2665cfdba8caac7ce36b46250bc0f6

  • SHA256

    b48a1be74fa295306d499815bfac2071feee2573c226758f75287d667514f83d

  • SHA512

    7f3501e07048a11e6df67806d67fa7078cb798267b944b0269dbe7b80730d1258104d74fc4e5512316624034148116c7020972ac6c3ba3d176e9c78264d17c5c

  • SSDEEP

    24576:4qDEvCTbMWu7rQYlBQcBiT6rprG8aQ1CCjqxkKqTBAEnLrhX:4TvC/MTQYxsWR7aQ8Cmx5qrh

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot7098045317:AAG_bq6J7neFFo87IXHfNBxKyzNKV56RSAA/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 33 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b48a1be74fa295306d499815bfac2071feee2573c226758f75287d667514f83d.exe
    "C:\Users\Admin\AppData\Local\Temp\b48a1be74fa295306d499815bfac2071feee2573c226758f75287d667514f83d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1600
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\b48a1be74fa295306d499815bfac2071feee2573c226758f75287d667514f83d.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3024

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\cacostomia

    Filesize

    268KB

    MD5

    bfd0a24603de75fbdc525aae0f0c7823

    SHA1

    1c26cdb7b35452bf41b0fd9160acf8e5848a8b93

    SHA256

    531af262fb42e94c46b27f1e7901fcd974f0ca7a7ca3f622e122494dca8997c1

    SHA512

    4588be1d3def44af913ac9492a0ae164602b71155fc6cd6f42ce79cc7623e46df412b15b103d83f3f547be56387e07f17f574fb04dd2c84bd8f084b8df842fb6

  • memory/1600-11-0x0000000000190000-0x0000000000194000-memory.dmp

    Filesize

    16KB

  • memory/3024-12-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3024-14-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3024-15-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/3024-16-0x000000007460E000-0x000000007460F000-memory.dmp

    Filesize

    4KB

  • memory/3024-17-0x00000000020C0000-0x0000000002118000-memory.dmp

    Filesize

    352KB

  • memory/3024-18-0x0000000002220000-0x0000000002276000-memory.dmp

    Filesize

    344KB

  • memory/3024-19-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-20-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-28-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-42-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-66-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-80-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-78-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-76-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-74-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-72-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-70-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-68-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-64-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-62-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-60-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-58-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-56-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-54-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-52-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-50-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-48-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-46-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-44-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-40-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-38-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-36-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-34-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-32-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-30-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-26-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-24-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-22-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-21-0x0000000002220000-0x0000000002271000-memory.dmp

    Filesize

    324KB

  • memory/3024-1155-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB

  • memory/3024-1157-0x000000007460E000-0x000000007460F000-memory.dmp

    Filesize

    4KB

  • memory/3024-1158-0x0000000074600000-0x0000000074CEE000-memory.dmp

    Filesize

    6.9MB