Analysis
-
max time kernel
126s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe
Resource
win10v2004-20240508-en
General
-
Target
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe
-
Size
205KB
-
MD5
010dbf456935b406fdc12b61bfe4960c
-
SHA1
792ab3f9831abb58ac79a2f6a7801226f5460be2
-
SHA256
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a
-
SHA512
86c691a22bf467985dbf1dacc9ace17fd30b6cd2b8b26220df0f5b9fe4e016624c8061c6cbd78d5223709a065fe2ff6c26ce5e7ee087a5e00f298b3d9384bdfd
-
SSDEEP
3072:3qNnCDDRvLGprOAOkGt6+duWA/t/SHUebbxCbGgKk12qk/FPYm21KLbDoUssNXNG:GstvLGcxLbMUMK2FH
Malware Config
Extracted
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
fn26k5c7Q846
Extracted
agenttesla
Protocol: smtp- Host:
66.29.151.236 - Port:
587 - Username:
[email protected] - Password:
fn26k5c7Q846 - Email To:
[email protected]
Extracted
xworm
5.0
94.156.65.181:5353
4EV9DEZhSiEuj72Q
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot5987023205:AAFlvwKv3zD3wQ2CQAewIB6uU95uBQ25ip0/sendMessage?chat_id=5202962680
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Xworm Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/448-9809-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Detect ZGRat V1 35 IoCs
Processes:
resource yara_rule behavioral2/memory/3884-3-0x0000000008030000-0x0000000008274000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-6-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-15-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-29-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-43-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-45-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-41-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-39-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-37-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-35-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-33-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-31-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-27-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-25-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-23-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-21-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-19-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-17-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-13-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-11-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-10-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-7-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-47-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-51-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-69-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-65-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-63-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-61-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-59-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-57-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-55-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-53-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-49-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-67-0x0000000008030000-0x000000000826E000-memory.dmp family_zgrat_v1 behavioral2/memory/3876-4915-0x0000000008790000-0x00000000089B0000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe -
Executes dropped EXE 2 IoCs
Processes:
Udzlkct.exeUdzlkct.exepid Process 3876 Udzlkct.exe 448 Udzlkct.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exeUdzlkct.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\savef = "C:\\Users\\Admin\\AppData\\Roaming\\savef.exe" c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\savef = "C:\\Users\\Admin\\AppData\\Roaming\\savef.exe" Udzlkct.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 21 api.ipify.org 22 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exeUdzlkct.exedescription pid Process procid_target PID 3884 set thread context of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3876 set thread context of 448 3876 Udzlkct.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
Udzlkct.exepid Process 448 Udzlkct.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exeUdzlkct.exepid Process 3180 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 3180 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 448 Udzlkct.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exeUdzlkct.exec53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exeUdzlkct.exedescription pid Process Token: SeDebugPrivilege 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Token: SeDebugPrivilege 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Token: SeDebugPrivilege 3876 Udzlkct.exe Token: SeDebugPrivilege 3180 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe Token: SeDebugPrivilege 3876 Udzlkct.exe Token: SeDebugPrivilege 448 Udzlkct.exe Token: SeDebugPrivilege 448 Udzlkct.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Udzlkct.exepid Process 448 Udzlkct.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exeUdzlkct.exedescription pid Process procid_target PID 3884 wrote to memory of 3876 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 83 PID 3884 wrote to memory of 3876 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 83 PID 3884 wrote to memory of 3876 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 83 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3884 wrote to memory of 3180 3884 c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe 84 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85 PID 3876 wrote to memory of 448 3876 Udzlkct.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"C:\Users\Admin\AppData\Local\Temp\Udzlkct.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:448
-
-
-
C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"C:\Users\Admin\AppData\Local\Temp\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\c53503eba1b0a2cbeb5256d0bd97e9391ad29ffa1a60ac0a649bd6c200e8685a.exe.log
Filesize1KB
MD5f3eb81974dc5933681e933f07209ff5f
SHA17af8cae0f1d03e82daaf784df9886705685baac7
SHA256e82069884dd428bd6a1c67fe00c5fa56f9c4d62b538b694694a699588f1f4ab2
SHA512d9aa3871dffb76c8a73a7940fa03bbc9b65cf575cbd07f7c1fbf490cb0f3d670415eaef0bf79e34689f61ab3cdfbb104efdef004becc12e54b501f02f948aaff
-
Filesize
205KB
MD5db5f32c4b447b0043c973905856e035c
SHA1290ce53a1ec22698b401f303b7bd57e469f5c0b4
SHA256f3c0c576ef9fe96da5c7bdbb72384ac195383058f1cf999dd435f0f94779d35e
SHA512a6119d265878a77c6f50ce5b8298638f01ef54f9fa47dfdbabdb66805d87bb8d42df9ba0f45120ffe3f0a479496a8331e31a9ae5cc4bdebf216483288ec1f837
-
Filesize
64KB
MD5f8d86e088aadd2e768d188befe12eeb5
SHA1e647e3645924c30ac438ddd525583083b6bf1984
SHA2563b79db81a34cc2b16417a37a669e298b2718ab592539e7aa46770611791e6c60
SHA512953c873276a0dc82fccafa4e825a31798f3836f9c6dac4bd8a5579f95e01a81f630c5e1b83cac728d6c20db0d2b45e1ad4695c6c9d8d64aca7864d9d8bbef918