Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-05-2024 01:36

General

  • Target

    92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe

  • Size

    1.2MB

  • MD5

    d123259f0d919be4c30c511debd1ea8d

  • SHA1

    2fb20310b104f57e4810d512f138a47e2fb1f8b2

  • SHA256

    92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623

  • SHA512

    3c5de0afce6edb67c5fca44d5af3ca16076be6d993013acb709a4bd7bf30540ef55b9919a0879924f150adf97ec537b5fdc7e4ad83323350583439869289c062

  • SSDEEP

    24576:xqDEvCTbMWu7rQYlBQcBiT6rprG8apoVBYCk70ww7TNF:xTvC/MTQYxsWR7apo8O

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 33 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe
    "C:\Users\Admin\AppData\Local\Temp\92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe"
      2⤵
        PID:2984
      • C:\Users\Admin\AppData\Local\Temp\92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe
        "C:\Users\Admin\AppData\Local\Temp\92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2504
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\92a314bf9cd8a43b29277834d900c82f7a2e978dcc19ba1dcad373d56217a623.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2612

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\turbinate

      Filesize

      263KB

      MD5

      e857ab81feab33757ece0bfec11cbb48

      SHA1

      c4386b5c0c270a0022e3e831bcd4be78b78ee250

      SHA256

      2c7088f08a0304b83c8265bcff28224b8aa4faa64545fd3def63992c0ce1b6e7

      SHA512

      e9cabbc60856406c064e32ea63209cf1826d7a81f84b8a3e789496b00ad4dc99fbc04ebe3f0fc3a13b2e6ab23fb6cedbfd8d57d05eb883078ae6edd9a7ea3088

    • C:\Users\Admin\AppData\Local\Temp\turbinate

      Filesize

      263KB

      MD5

      9f0b84bb4dd9938dac47b0a24a1aaf38

      SHA1

      f80e338f714cd4df612b0558200f35917cfa7d03

      SHA256

      bd0f7defce49abcdc5e9a1b546fb1ca6b0f6cccba0c0f761bf5deae6125c9d82

      SHA512

      2196b8e4ceb3f3da4cfe40b6392b958555e624ca6cf369e1f8f05909873d6137eca0cf474c20323b5b7928637aaaca07ba69d3594be6a9c6bcfe50f65390d300

    • memory/1904-11-0x0000000000130000-0x0000000000134000-memory.dmp

      Filesize

      16KB

    • memory/2612-76-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-29-0x000000007446E000-0x000000007446F000-memory.dmp

      Filesize

      4KB

    • memory/2612-28-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2612-69-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-30-0x00000000003A0000-0x00000000003F6000-memory.dmp

      Filesize

      344KB

    • memory/2612-32-0x0000000074460000-0x0000000074B4E000-memory.dmp

      Filesize

      6.9MB

    • memory/2612-31-0x0000000000450000-0x00000000004A4000-memory.dmp

      Filesize

      336KB

    • memory/2612-33-0x0000000074460000-0x0000000074B4E000-memory.dmp

      Filesize

      6.9MB

    • memory/2612-73-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-65-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-25-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2612-94-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-67-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-90-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-88-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-86-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-84-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-82-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-80-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-78-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-71-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-27-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2612-92-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-63-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-61-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-57-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-47-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-43-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-41-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-75-0x0000000074460000-0x0000000074B4E000-memory.dmp

      Filesize

      6.9MB

    • memory/2612-39-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-37-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-35-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-34-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-59-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-56-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-53-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-51-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-49-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-45-0x0000000000450000-0x000000000049E000-memory.dmp

      Filesize

      312KB

    • memory/2612-1079-0x0000000074460000-0x0000000074B4E000-memory.dmp

      Filesize

      6.9MB

    • memory/2612-1080-0x0000000000400000-0x0000000000446000-memory.dmp

      Filesize

      280KB

    • memory/2612-1081-0x000000007446E000-0x000000007446F000-memory.dmp

      Filesize

      4KB

    • memory/2612-1082-0x0000000074460000-0x0000000074B4E000-memory.dmp

      Filesize

      6.9MB