Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe

Overview

General Information

Sample name:172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
Analysis ID:1525935
MD5:5c5309a374fb55f69dc553784a6cd263
SHA1:6cb9f0c44c7cb36887fa2cfc38d63e0773b98912
SHA256:a74d597f7740d12d4ec6fa74d14f0bba628eced82be37e2025605d7df374d51f
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

PureLog Stealer, zgRAT
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
AI detected suspicious sample
Machine Learning detection for sample
Binary contains a suspicious time stamp
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x9d3d8:$s1: file:///
      • 0x9d310:$s2: {11111-22222-10009-11112}
      • 0x9d368:$s3: {11111-22222-50001-00000}
      • 0x96991:$s4: get_Module
      • 0x901c1:$s5: Reverse
      • 0x911b2:$s6: BlockCopy
      • 0x901a8:$s7: ReadByte
      • 0x9d3ea:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeReversingLabs: Detection: 13%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.0% probability
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeJoe Sandbox ML: detected
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      System Summary

      barindex
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe, type: SAMPLEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: No import functions for PE file found
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeBinary or memory string: OriginalFilenamePrinces.exe" vs 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: classification engineClassification label: mal80.troj.winEXE@0/0@0/0
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeReversingLabs: Detection: 13%
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exeStatic PE information: 0xB3E06D3A [Tue Aug 18 14:01:30 2065 UTC]

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe, type: SAMPLE
      Source: Yara matchFile source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe, type: SAMPLE
      Source: Yara matchFile source: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      Timestomp
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      SourceDetectionScannerLabelLink
      172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe13%ReversingLabs
      172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalse
        unknown
        No contacted IP infos
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1525935
        Start date and time:2024-10-04 16:42:56 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 2m 2s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:1
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
        Detection:MAL
        Classification:mal80.troj.winEXE@0/0@0/0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Unable to launch sample, stop analysis
        • No process behavior to analyse as no analysis process or sample was found
        • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
        • Exclude process from analysis (whitelisted): dllhost.exe
        • Excluded IPs from analysis (whitelisted): 20.223.35.26
        • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, arc.trafficmanager.net, azureedge-t-prod.trafficmanager.net, arc.msn.com, iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
        • VT rate limit hit for: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
        No simulations
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        s-part-0017.t-0009.t-msedge.net172805103060562668ff813b96bb39228899ea60d484cdaf2eb283e12714742a82fec8bdd0417.dat-decoded.exeGet hashmaliciousRHADAMANTHYSBrowse
        • 13.107.246.45
        file.exeGet hashmaliciousLummaC, VidarBrowse
        • 13.107.246.45
        f2e7fcb20146.exeGet hashmaliciousStealcBrowse
        • 13.107.246.45
        https://smallpdf.com/sign-pdf/document#data=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.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.OqxYiO2DP6wYmX2t6u3X4Qa-FIZ5J__ELTV29qKimLo&eid=2461416d-babf-4309-94ac-aebdc4c2ffcc&esrt=7cfbf3c6-dbae-4056-af61-e159684e1e78Get hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        App_installer32_64x.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
        • 13.107.246.45
        https://mail.inforumahsumut.com/Get hashmaliciousUnknownBrowse
        • 13.107.246.45
        https://cpanel.lmsummaryservice.com/Get hashmaliciousUnknownBrowse
        • 13.107.246.45
        Payout Receipt.pptxGet hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        https://jhansalazar.weebly.com/Get hashmaliciousUnknownBrowse
        • 13.107.246.45
        https://www.google.com/url?sa=t&url=https%3A%2F%2F%6d%6f%73%63%76%61%64%75%6d%61%2e%70%72%6f%2F&usg=AOvVaw0d8WU-1rxjmcdGQTa3JxQL&opi=Get hashmaliciousHTMLPhisherBrowse
        • 13.107.246.45
        No context
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):5.5347812927186135
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
        • Win32 Executable (generic) a (10002005/4) 49.78%
        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        File name:172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
        File size:982'639 bytes
        MD5:5c5309a374fb55f69dc553784a6cd263
        SHA1:6cb9f0c44c7cb36887fa2cfc38d63e0773b98912
        SHA256:a74d597f7740d12d4ec6fa74d14f0bba628eced82be37e2025605d7df374d51f
        SHA512:646d749ee4b0afd9ff9b5c7566d4e4a03836965d78d3eed1f8ca22fdd541bce63568d1305e7525bbb1407a591c897dc541e4bd25dea329a52cc77690373ac97a
        SSDEEP:12288:v2SYqkc3Uu+9td0UvoLKk5ceIX9viyGl5iw1xk2F91QK3pkxiHw8:vXYqHLIk5KNvkLhf
        TLSH:C9253F326546CE57D15B0A71C05784F027A8AE7AE223D30F6449BF2DBC33FA1678794A
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:m................0..r...*......~.... ........@.. ....................................@................................
        Icon Hash:00928e8e8686b000
        Entrypoint:0x4a907e
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0xB3E06D3A [Tue Aug 18 14:01:30 2065 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        cmpsb
        push edx
        or dword ptr [edx-2Bh], ebp
        xor byte ptr [esi], dh
        movsd
        cmp byte ptr [edi-7E615CC0h], bh
        xlatb
        sti
        jl 00007F7D10B1FB55h
        cmp dword ptr [edx-7800D065h], eax
        xor al, 8Eh
        inc ebx
        inc esp
        les ebx, esi
        jmp 00007F7CA52D5040h
        xor ah, byte ptr [esi-11C2DC3Eh]
        dec esp
        xchg eax, ebp
        or eax, dword ptr [edx-06h]
        ret
        dec esi
        or byte ptr [esi], ch
        mov eax, dword ptr [24D92866h]
        mov dl, 76h
        pop ebx
        mov byte ptr [D18B6D49h], al
        and eax, 64F6F872h
        xchg byte ptr [eax-68h], ch
        push ss
        aam A4h
        pop esp
        int3
        pop ebp
        mov dh, 92h
        insb
        jo 00007F7D10B1FBBAh
        push eax
        std
        in eax, dx
        mov ecx, 46155EDAh
        push edi
        cmpsd
        lea ebx, dword ptr [ebp-54276F7Ch]
        add byte ptr [esp+edi*4-1B08F52Dh], cl
        pop eax
        add eax, 0645B3B8h
        shr byte ptr [esi+ebx], 1
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0xa90300x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x42678.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0xee0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000xa70840xa7200c550b6bd3725294a81e67cd258efa3beFalse0.4244124555908751data5.8102288179522885IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0xaa0000x426780x428005764d1fe246b6de8a5da45c6ee519fa0False0.12856849154135339data3.8425862913271103IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0xee0000xc0x2004e777d3cc4533b69a70d039097d9c0a3False0.064453125data1.5172084476244796IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Oct 4, 2024 16:44:18.050508022 CEST1.1.1.1192.168.2.60xd424No error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
        Oct 4, 2024 16:44:18.050508022 CEST1.1.1.1192.168.2.60xd424No error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
        No statistics
        No system behavior
        No disassembly