Analysis
-
max time kernel
119s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
09-05-2024 10:10
Static task
static1
Behavioral task
behavioral1
Sample
cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe
Resource
win10v2004-20240426-en
General
-
Target
cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe
-
Size
333KB
-
MD5
a0be261297db01d0bc63e1a03ae87ae8
-
SHA1
a2c5e4e973fa879075835a71e708613d1c027b58
-
SHA256
cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c
-
SHA512
a19e3fe6e1069226eb9589ca8c01f266ab926f55c7643ab368b5caf6a6d2640de8baa7df1db41ad527220895b1fe623177e8e2318d451c54f849d0e389aa9be0
-
SSDEEP
3072:/fRpGUFCBSUX5F1gz9yc9l+q4Wid9KuQpe5604Db5bQV:xp/CBSUj1K9ya+q4vd/gQ1ob5cV
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
s9jjoVvaZchS - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2240-3-0x00000000064E0000-0x0000000006710000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-4-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-5-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-7-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-9-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-51-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-48-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-11-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-13-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-15-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-17-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-19-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-21-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-23-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-25-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-27-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-29-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-31-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-33-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-35-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-67-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-65-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-63-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-61-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-59-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-57-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-55-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-53-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-49-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-45-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-43-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-41-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-39-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 behavioral1/memory/2240-37-0x00000000064E0000-0x000000000670B000-memory.dmp family_zgrat_v1 -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2737914667-933161113-3798636211-1000\Software\Microsoft\Windows\CurrentVersion\Run\iotsof = "C:\\Users\\Admin\\AppData\\Roaming\\iotsof.exe" cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1412 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 1412 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe Token: SeDebugPrivilege 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe Token: SeDebugPrivilege 1412 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28 PID 2240 wrote to memory of 1412 2240 cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe"C:\Users\Admin\AppData\Local\Temp\cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe"C:\Users\Admin\AppData\Local\Temp\cddf923cac901564bdb3e9abfb1f3aa2a403060232efbe5fd21e03008c1f5a4c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-