Analysis

  • max time kernel
    142s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 07:04

General

  • Target

    PO-20231228003.exe

  • Size

    1.3MB

  • MD5

    bb078c83338aa40005dcc903e8d00842

  • SHA1

    99516fbbfc72156970db12059d52a9d2f16aff5b

  • SHA256

    0ae05a66eb5e6dd6fc26a59f27d48f3cd28ae6c1454082045a32aff02d87c854

  • SHA512

    5b56402c626a92237d1e0a11e6c9034b1632fda921eb5c6fc0389b44e1f4c6eaa0318d0fa0ec2d5be8221c240d98d754bd275a9097f6bd592d3626af0d199e4e

  • SSDEEP

    24576:y4lavt0LkLL9IMixoEgeadMxjIuN6RimoUayq9MmCS:lkwkn9IMHeadAjCCU1aPCS

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe
    "C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3680
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"
      2⤵
        PID:1832
      • C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe
        "C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"
        2⤵
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:3892
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"
          3⤵
            PID:1796
          • C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe
            "C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:4632
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Users\Admin\AppData\Local\Temp\PO-20231228003.exe"
              4⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:3180

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ageless

        Filesize

        262KB

        MD5

        c3a05fabceffe2fc8def9cbdd30cd3d2

        SHA1

        32ef7e0a9d3f2ba30c3573fdd26714a96b12428c

        SHA256

        91fb367c7bff600e4db5b8a96136b0fe500b193f4587d971563baa9d8187b7a9

        SHA512

        2dc0d4b09aabe3a9b931d4f6ec99fecf19e5845a9f4d7765ed858fb4f77ec15824bbc600ccdc6bd30816ed6ff3189e2203f059d6989d33bc48501a0f34310573

      • C:\Users\Admin\AppData\Local\Temp\aut47A8.tmp

        Filesize

        259KB

        MD5

        620d101fc3ca4048f9a01f26aa7c8962

        SHA1

        262d92881ab6e0a0dc0b8028a1d392954fda77e1

        SHA256

        e6fce92b74e0b6aa310731cc4b8f3157f87666be782dd3a2f4f68945b6fe06ea

        SHA512

        9199d5a32c6ba5eb9c0f941aca13bcdcfa79231ab8e7fe39be14af5dd0a997ad1240f2fe93fe25fcb277805200bd8fa43c1149dbdeba5579a28d9a37d791c9a3

      • C:\Users\Admin\AppData\Local\Temp\aut47B8.tmp

        Filesize

        9KB

        MD5

        509a6a9ff60c7922a8fb4dfe70b927d4

        SHA1

        6d37d1d9940e4e8542f294247700bf31acc19afd

        SHA256

        378d85f3bc69533db8aea7d813fd63a9192fd4e7de59cb8e81fbcfad2d7d7f14

        SHA512

        5799f1db9780e6cc1ff5f847eb272423fc467a31596b7cb8393a86cbe1b027d8a8e8615d4e931fc7264ce66ffcde76b3553dcfee079e3abf10af6b57e2c4ee57

      • C:\Users\Admin\AppData\Local\Temp\maneuverability

        Filesize

        28KB

        MD5

        0890ddda3c33d9596c0ed994671c138e

        SHA1

        00d5c6a246cb9ad2620feca83d27731b65116eb8

        SHA256

        d9afa70063c694a5c80caee8f4f5f55a66cc1289896d3f0993fd7ed9c97551c9

        SHA512

        d8631f8ec094770c1a369140af157837232e90173b764c73339cac3911efc6559ee9667fde656ffad9e0ba40f79ab8536bf6a55a057101e2770eb74f483b4a2f

      • memory/3180-63-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-88-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-37-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3180-38-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3180-36-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3180-39-0x0000000002E40000-0x0000000002E94000-memory.dmp

        Filesize

        336KB

      • memory/3180-40-0x0000000005AD0000-0x0000000006074000-memory.dmp

        Filesize

        5.6MB

      • memory/3180-41-0x0000000005400000-0x0000000005452000-memory.dmp

        Filesize

        328KB

      • memory/3180-49-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-103-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-101-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-99-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-95-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-55-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-89-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-57-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-85-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-83-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-67-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-65-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-1076-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3180-61-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-35-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/3180-59-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-91-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-53-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-51-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-47-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-45-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-97-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-93-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-43-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-81-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-79-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-42-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-77-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-75-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-73-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-71-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-69-0x0000000005400000-0x000000000544D000-memory.dmp

        Filesize

        308KB

      • memory/3180-1072-0x0000000005620000-0x0000000005686000-memory.dmp

        Filesize

        408KB

      • memory/3180-1073-0x0000000006410000-0x0000000006460000-memory.dmp

        Filesize

        320KB

      • memory/3180-1074-0x0000000006500000-0x0000000006592000-memory.dmp

        Filesize

        584KB

      • memory/3180-1075-0x0000000006460000-0x000000000646A000-memory.dmp

        Filesize

        40KB

      • memory/3680-10-0x0000000004E30000-0x0000000004E34000-memory.dmp

        Filesize

        16KB