Analysis
-
max time kernel
120s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14-05-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe
Resource
win10v2004-20240508-en
General
-
Target
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe
-
Size
205KB
-
MD5
010dbf456935b406fdc12b61bfe4960c
-
SHA1
792ab3f9831abb58ac79a2f6a7801226f5460be2
-
SHA256
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a
-
SHA512
86c691a22bf467985dbf1dacc9ace17fd30b6cd2b8b26220df0f5b9fe4e016624c8061c6cbd78d5223709a065fe2ff6c26ce5e7ee087a5e00f298b3d9384bdfd
-
SSDEEP
3072:3qNnCDDRvLGprOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/FPYm21KLbDoUssNXNG:GstvLGcxLbMUMK2FH
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
fn26k5c7Q846 - Email To:
[email protected]
Extracted
xworm
5.0
94.156.65.181:5353
4EV9DEZhSiEuj72Q
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot5987023205:AAFlvwKv3zD3wQ2CQAewIB6uU95uBQ25ip0/sendMessage?chat_id=5202962680
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral1/memory/3400-9820-0x00000000000C0000-0x00000000000D0000-memory.dmp family_xworm -
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2492-3-0x0000000008700000-0x0000000008944000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-9-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-15-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-4-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-17-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-5-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-21-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-19-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-13-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-42-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-60-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-33-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-65-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-67-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-63-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-57-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-55-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-53-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-51-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-49-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-47-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-45-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-43-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-39-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-37-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-35-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-31-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-29-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-27-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-25-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-24-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-11-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-61-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/2492-7-0x0000000008700000-0x000000000893E000-memory.dmp family_zgrat_v1 behavioral1/memory/1376-4915-0x00000000089C0000-0x0000000008BE0000-memory.dmp family_zgrat_v1 -
Executes dropped EXE 2 IoCs
pid Process 1376 Udzlkct.exe 3400 Udzlkct.exe -
Loads dropped DLL 2 IoCs
pid Process 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 1376 Udzlkct.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\savef = "C:\\Users\\Admin\\AppData\\Roaming\\savef.exe" c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\savef = "C:\\Users\\Admin\\AppData\\Roaming\\savef.exe" Udzlkct.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 8 api.ipify.org 9 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2492 set thread context of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 1376 set thread context of 3400 1376 Udzlkct.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3400 Udzlkct.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2880 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 2880 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 3400 Udzlkct.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Token: SeDebugPrivilege 1376 Udzlkct.exe Token: SeDebugPrivilege 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Token: SeDebugPrivilege 2880 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Token: SeDebugPrivilege 1376 Udzlkct.exe Token: SeDebugPrivilege 3400 Udzlkct.exe Token: SeDebugPrivilege 3400 Udzlkct.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3400 Udzlkct.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1376 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 28 PID 2492 wrote to memory of 1376 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 28 PID 2492 wrote to memory of 1376 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 28 PID 2492 wrote to memory of 1376 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 28 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 2492 wrote to memory of 2880 2492 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 29 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33 PID 1376 wrote to memory of 3400 1376 Udzlkct.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3400
-
-
-
C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD522e5919e552415e5d448f4fa4dfbe9d8
SHA11df4faafb45b643b94080b5abe61b0ea84cc379e
SHA25664ec5860e7951894acae5d628baca237e2ff4ce45f12dc154c3d9da5aa55fd90
SHA51228a77aa8460831fd3cad55068baad217d9542960cd4db71f9cd8a2196cf25d47b1bc7bb1777f8d10af546283fa6538f41e905b9f9c5725e1f84902e0d7318e2a
-
Filesize
205KB
MD5db5f32c4b447b0043c973905856e035c
SHA1290ce53a1ec22698b401f303b7bd57e469f5c0b4
SHA256f3c0c576ef9fe96da5c7bdbb72384ac195383058f1cf999dd435f0f94779d35e
SHA512a6119d265878a77c6f50ce5b8298638f01ef54f9fa47dfdbabdb66805d87bb8d42df9ba0f45120ffe3f0a479496a8331e31a9ae5cc4bdebf216483288ec1f837