Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe

Overview

General Information

Sample name:1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe
Analysis ID:1579148
MD5:a54be4b5db402a4b6f4703aaa5595c20
SHA1:d5106199ff88b05b00731d00a334969efd1c534c
SHA256:2be8054c9f877516acb8dcba364b46c2b1a52b049fd96ebf59f33b80b4ca3d8f
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

PureLog Stealer, zgRAT
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Machine Learning detection for sample
Binary contains a suspicious time stamp
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x57e40:$s1: file:///
      • 0x57d2c:$s2: {11111-22222-10009-11112}
      • 0x57dd0:$s3: {11111-22222-50001-00000}
      • 0x538dd:$s4: get_Module
      • 0x53fbd:$s5: Reverse
      • 0x4de81:$s6: BlockCopy
      • 0x54438:$s7: ReadByte
      • 0x57e52:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 96.3% probability
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeJoe Sandbox ML: detected
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      System Summary

      barindex
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe, type: SAMPLEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: No import functions for PE file found
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeBinary or memory string: OriginalFilenameSteal1.exe, vs 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: Section: .rsrc ZLIB complexity 1.0071614583333333
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: Section: .reloc ZLIB complexity 1.021484375
      Source: classification engineClassification label: mal72.troj.winEXE@0/0@0/0
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exeStatic PE information: 0xE702F9E4 [Sat Oct 25 00:12:20 2092 UTC]

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe, type: SAMPLE
      Source: Yara matchFile source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe, type: SAMPLE
      Source: Yara matchFile source: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      Software Packing
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Timestomp
      LSASS MemoryApplication Window DiscoveryRemote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      bg.microsoft.map.fastly.net
      199.232.214.172
      truefalse
        high
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1579148
        Start date and time:2024-12-20 23:04:07 +01:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 1m 43s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:1
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe
        Detection:MAL
        Classification:mal72.troj.winEXE@0/0@0/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Unable to launch sample, stop analysis
        • No process behavior to analyse as no analysis process or sample was found
        • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 20.231.128.65, 13.107.246.63
        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net
        • VT rate limit hit for: 1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        bg.microsoft.map.fastly.netStatements.pdfGet hashmaliciousWinSearchAbuseBrowse
        • 199.232.210.172
        INVOICE_2279_from_RealEyes Digital LLC (1).pdfGet hashmaliciousUnknownBrowse
        • 199.232.214.172
        Z8oTIWCyDE.exeGet hashmaliciousLummaCBrowse
        • 199.232.210.172
        BB4S2ErvqK.exeGet hashmaliciousLummaCBrowse
        • 199.232.214.172
        MS100384UTC.xlsGet hashmaliciousUnknownBrowse
        • 199.232.210.172
        SWIFT.xlsGet hashmaliciousUnknownBrowse
        • 199.232.214.172
        tmp.zipGet hashmaliciousUnknownBrowse
        • 199.232.210.172
        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Stealc, zgRATBrowse
        • 199.232.210.172
        https://p.placed.com/api/v2/sync/impression?partner=barkley&plaid=0063o000014sWgoAAE&version=1.0&payload_campaign_identifier=71700000100870630&payload_timestamp=5943094174221506287&payload_type=impression&redirect=http%3A%2F%2Fgoogle.com%2Famp%2Fs%2Fgoal.com.co%2Fwp%2FpaymentGet hashmaliciousHTMLPhisherBrowse
        • 199.232.214.172
        Dec 2024_12192924_Image.pdfGet hashmaliciousHTMLPhisherBrowse
        • 199.232.214.172
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.976571246498081
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
        • Win32 Executable (generic) a (10002005/4) 49.75%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Windows Screen Saver (13104/52) 0.07%
        • Generic Win/DOS Executable (2004/3) 0.01%
        File name:1734732186278e5c87d1a316617c1125acd5c32aedeebfd021b1e761647265ea7426c527bd565.dat-decoded.exe
        File size:410'130 bytes
        MD5:a54be4b5db402a4b6f4703aaa5595c20
        SHA1:d5106199ff88b05b00731d00a334969efd1c534c
        SHA256:2be8054c9f877516acb8dcba364b46c2b1a52b049fd96ebf59f33b80b4ca3d8f
        SHA512:660a9a19c9b2deb4fa6212579d1e7b400e0c3c93a14874c41d72ab5a717c7247167c51effa221cc1a04a9ba978b30a876bd24a1ae3981424dffb25ef61185257
        SSDEEP:6144:agMvdMIA/xxSlOPcYwUH0tZTzO+RnYj3OKtymGSc5t/ovhqbTdDf1+s74NIvuc:BMvqIA/x4wbwUHxh+KImGdzqhInEN+
        TLSH:E0940A0BBE45CD52C29C5B36C4DF4008A7B9D642725BDA0E7CCA13E5094337BB94ADAB
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0..............,... ...@....@.. ....................................`................................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x462c9e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xE702F9E4 [Sat Oct 25 00:12:20 2092 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        xor al, 3Ah
        jns 00007EFE64BD98D2h
        iretd
        push ebx
        cli
        jle 00007EFE64BD991Bh
        arpl word ptr [eax], cx
        mov al, byte ptr [DE3A8183h]
        retn 5543h
        mul ah
        movsd
        nop
        jl 00007EFE64BD9965h
        pop ecx
        sbb ah, cl
        pop ds
        sbb ecx, dword ptr [edi-64h]
        dec ebp
        shl byte ptr [edx+6CF24FFAh], 00000039h
        test dl, dh
        add eax, dword ptr [ecx+0919DE3Ah]
        and dl, dh
        in al, A2h
        sbb dword ptr [eax-6E94A53Ch], edi
        mov dword ptr [6224C0B1h], eax
        retf
        inc edi
        retf D3D2h
        xor ch, byte ptr [eax+49AAF1DAh]
        insd
        outsd
        adc al, byte ptr [ebx-31h]
        sar dword ptr [8070B476h], cl
        cmp bh, byte ptr [edi+edi-12h]
        cmc
        and ch, dh
        jmp 00007EFE93836CA7h
        sub dword ptr [eax+46C462B8h], eax
        and dh, byte ptr [eax-1F0FD6E4h]
        dec esi
        mov bh, ADh
        retf C9C4h
        insb
        or dword ptr [edi-664DA558h], FFFFFFC9h
        test dword ptr [edx+1Fh], edx
        call 00007EFE2F32CF6Bh
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x62c500x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x640000x590.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x660000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x60ca40x60e00487c1e573f3cb19face0e36249d8096bFalse0.456171875data5.9696113015641155IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x640000x5900x6008b4b2fd72d2ecdcb2b44d6e4e4068bdaFalse1.0071614583333333data7.835397660629519IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x660000xc0x200085d9346fb5b385ab3f40631c5e07eb2False1.021484375data7.528580923265876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 20, 2024 23:05:17.253288031 CET1.1.1.1192.168.2.50x1628No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
        Dec 20, 2024 23:05:17.253288031 CET1.1.1.1192.168.2.50x1628No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
        No statistics
        No system behavior
        No disassembly