Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15-05-2024 15:03
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Hqjtehdep.exe
Resource
win7-20240220-en
10 signatures
150 seconds
Behavioral task
behavioral2
Sample
Hqjtehdep.exe
Resource
win10v2004-20240426-en
10 signatures
150 seconds
General
-
Target
Hqjtehdep.exe
-
Size
4.4MB
-
MD5
dcbe06e2f3054aa9126691eaa33f03f2
-
SHA1
9716dc37e885de30efb8319f3653782c25712db2
-
SHA256
6e93b0e461b5098a0b9f61b10199135452cf93e54fd2d4fa37b9df909591be2b
-
SHA512
4ed52f2783ad6813526f0e3dd6fb4c1648aa5883f1beca5cd8f12cd50828d2c52ad782133bd8e4a57348fdc7b089b62e222550b146dab6447ca46c15f0e50b88
-
SSDEEP
24576:ENrJDheOmsfxYFB6YST9YaCjWbOCixQel8vBw+/m6hWsmQvd6KqcR3PPwf:E
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.spia-indonesia.org - Port:
587 - Username:
[email protected] - Password:
Looloo123@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/2772-2-0x0000000006CF0000-0x0000000006F22000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-10-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-6-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-16-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-28-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-40-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-58-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-66-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-64-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-62-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-60-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-68-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-56-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-54-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-46-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-44-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-42-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-38-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-36-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-34-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-52-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-50-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-48-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-32-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-30-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-20-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-14-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-12-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-8-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-26-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-24-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-22-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-18-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 behavioral2/memory/2772-5-0x0000000006CF0000-0x0000000006F1B000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MvQHOaQ = "C:\\Users\\Admin\\AppData\\Roaming\\MvQHOaQ\\MvQHOaQ.exe" aspnet_compiler.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 54 api.ipify.org 53 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2772 set thread context of 4672 2772 Hqjtehdep.exe 97 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4672 aspnet_compiler.exe 4672 aspnet_compiler.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2772 Hqjtehdep.exe Token: SeDebugPrivilege 2772 Hqjtehdep.exe Token: SeDebugPrivilege 4672 aspnet_compiler.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4672 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97 PID 2772 wrote to memory of 4672 2772 Hqjtehdep.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Hqjtehdep.exe"C:\Users\Admin\AppData\Local\Temp\Hqjtehdep.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4672
-