Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 07:04
Static task
static1
Behavioral task
behavioral1
Sample
PO-20231228003.exe
Resource
win7-20240419-en
General
-
Target
PO-20231228003.exe
-
Size
1.3MB
-
MD5
bb078c83338aa40005dcc903e8d00842
-
SHA1
99516fbbfc72156970db12059d52a9d2f16aff5b
-
SHA256
0ae05a66eb5e6dd6fc26a59f27d48f3cd28ae6c1454082045a32aff02d87c854
-
SHA512
5b56402c626a92237d1e0a11e6c9034b1632fda921eb5c6fc0389b44e1f4c6eaa0318d0fa0ec2d5be8221c240d98d754bd275a9097f6bd592d3626af0d199e4e
-
SSDEEP
24576:y4lavt0LkLL9IMixoEgeadMxjIuN6RimoUayq9MmCS:lkwkn9IMHeadAjCCU1aPCS
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3180-39-0x0000000002E40000-0x0000000002E94000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-41-0x0000000005400000-0x0000000005452000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-49-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-103-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-101-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-99-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-95-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-91-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-89-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-88-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-85-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-83-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-67-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-65-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-63-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-61-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-59-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-57-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-55-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-53-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-51-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-47-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-45-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-97-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-93-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-43-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-81-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-79-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-42-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-77-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-75-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-73-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-71-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 behavioral2/memory/3180-69-0x0000000005400000-0x000000000544D000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4632 set thread context of 3180 4632 PO-20231228003.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3180 RegSvcs.exe 3180 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3680 PO-20231228003.exe 3892 PO-20231228003.exe 4632 PO-20231228003.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3180 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3680 PO-20231228003.exe 3680 PO-20231228003.exe 3892 PO-20231228003.exe 3892 PO-20231228003.exe 4632 PO-20231228003.exe 4632 PO-20231228003.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3680 PO-20231228003.exe 3680 PO-20231228003.exe 3892 PO-20231228003.exe 3892 PO-20231228003.exe 4632 PO-20231228003.exe 4632 PO-20231228003.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3680 wrote to memory of 1832 3680 PO-20231228003.exe 86 PID 3680 wrote to memory of 1832 3680 PO-20231228003.exe 86 PID 3680 wrote to memory of 1832 3680 PO-20231228003.exe 86 PID 3680 wrote to memory of 3892 3680 PO-20231228003.exe 87 PID 3680 wrote to memory of 3892 3680 PO-20231228003.exe 87 PID 3680 wrote to memory of 3892 3680 PO-20231228003.exe 87 PID 3892 wrote to memory of 1796 3892 PO-20231228003.exe 88 PID 3892 wrote to memory of 1796 3892 PO-20231228003.exe 88 PID 3892 wrote to memory of 1796 3892 PO-20231228003.exe 88 PID 3892 wrote to memory of 4632 3892 PO-20231228003.exe 89 PID 3892 wrote to memory of 4632 3892 PO-20231228003.exe 89 PID 3892 wrote to memory of 4632 3892 PO-20231228003.exe 89 PID 4632 wrote to memory of 3180 4632 PO-20231228003.exe 90 PID 4632 wrote to memory of 3180 4632 PO-20231228003.exe 90 PID 4632 wrote to memory of 3180 4632 PO-20231228003.exe 90 PID 4632 wrote to memory of 3180 4632 PO-20231228003.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"2⤵PID:1832
-
-
C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"3⤵PID:1796
-
-
C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5c3a05fabceffe2fc8def9cbdd30cd3d2
SHA132ef7e0a9d3f2ba30c3573fdd26714a96b12428c
SHA25691fb367c7bff600e4db5b8a96136b0fe500b193f4587d971563baa9d8187b7a9
SHA5122dc0d4b09aabe3a9b931d4f6ec99fecf19e5845a9f4d7765ed858fb4f77ec15824bbc600ccdc6bd30816ed6ff3189e2203f059d6989d33bc48501a0f34310573
-
Filesize
259KB
MD5620d101fc3ca4048f9a01f26aa7c8962
SHA1262d92881ab6e0a0dc0b8028a1d392954fda77e1
SHA256e6fce92b74e0b6aa310731cc4b8f3157f87666be782dd3a2f4f68945b6fe06ea
SHA5129199d5a32c6ba5eb9c0f941aca13bcdcfa79231ab8e7fe39be14af5dd0a997ad1240f2fe93fe25fcb277805200bd8fa43c1149dbdeba5579a28d9a37d791c9a3
-
Filesize
9KB
MD5509a6a9ff60c7922a8fb4dfe70b927d4
SHA16d37d1d9940e4e8542f294247700bf31acc19afd
SHA256378d85f3bc69533db8aea7d813fd63a9192fd4e7de59cb8e81fbcfad2d7d7f14
SHA5125799f1db9780e6cc1ff5f847eb272423fc467a31596b7cb8393a86cbe1b027d8a8e8615d4e931fc7264ce66ffcde76b3553dcfee079e3abf10af6b57e2c4ee57
-
Filesize
28KB
MD50890ddda3c33d9596c0ed994671c138e
SHA100d5c6a246cb9ad2620feca83d27731b65116eb8
SHA256d9afa70063c694a5c80caee8f4f5f55a66cc1289896d3f0993fd7ed9c97551c9
SHA512d8631f8ec094770c1a369140af157837232e90173b764c73339cac3911efc6559ee9667fde656ffad9e0ba40f79ab8536bf6a55a057101e2770eb74f483b4a2f