Windows
Analysis Report
172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
Overview
General Information
Sample name: | 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe |
Analysis ID: | 1525935 |
MD5: | 5c5309a374fb55f69dc553784a6cd263 |
SHA1: | 6cb9f0c44c7cb36887fa2cfc38d63e0773b98912 |
SHA256: | a74d597f7740d12d4ec6fa74d14f0bba628eced82be37e2025605d7df374d51f |
Tags: | base64-decodedexeuser-abuse_ch |
Infos: | |
Errors
|
Detection
Score: | 80 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Name | Description | Attribution | Blogpost URLs | Link |
---|---|---|---|---|
zgRAT | zgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on. | No Attribution |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_zgRAT_1 | Yara detected zgRAT | Joe Security | ||
JoeSecurity_PureLogStealer | Yara detected PureLog Stealer | Joe Security | ||
MALWARE_Win_zgRAT | Detects zgRAT | ditekSHen |
|
Click to jump to signature section
AV Detection |
---|
Source: | ReversingLabs: |
Source: | Integrated Neural Analysis Model: |
Source: | Joe Sandbox ML: |
Source: | Static PE information: |
Source: | Static PE information: |
System Summary |
---|
Source: | Matched rule: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Matched rule: |
Source: | Classification label: |
Source: | Static PE information: |
Source: | Static file information: |
Source: | ReversingLabs: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Stealing of Sensitive Information |
---|
Source: | File source: |
Source: | File source: |
Remote Access Functionality |
---|
Source: | File source: |
Source: | File source: |
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Gather Victim Identity Information | Acquire Infrastructure | Valid Accounts | Windows Management Instrumentation | Path Interception | Path Interception | 1 Timestomp | OS Credential Dumping | System Service Discovery | Remote Services | Data from Local System | Data Obfuscation | Exfiltration Over Other Network Medium | Abuse Accessibility Features |
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
13% | ReversingLabs | |||
100% | Joe Sandbox ML |
Name | IP | Active | Malicious | Antivirus Detection | Reputation |
---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | 13.107.246.45 | true | false | unknown |
Joe Sandbox version: | 41.0.0 Charoite |
Analysis ID: | 1525935 |
Start date and time: | 2024-10-04 16:42:56 +02:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 2m 2s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01 |
Number of analysed new started processes analysed: | 1 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Sample name: | 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe |
Detection: | MAL |
Classification: | mal80.troj.winEXE@0/0@0/0 |
Cookbook Comments: |
|
- No process behavior to analyse as no analysis process or sample was found
- Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
- Exclude process from analysis (whitelisted): dllhost.exe
- Excluded IPs from analysis (whitelisted): 20.223.35.26
- Excluded domains from analysis (whitelisted): otelrules.azureedge.net, otelrules.afd.azureedge.net, arc.trafficmanager.net, azureedge-t-prod.trafficmanager.net, arc.msn.com, iris-de-prod-azsc-v2-neu.northeurope.cloudapp.azure.com
- VT rate limit hit for: 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe
Match | Associated Sample Name / URL | SHA 256 | Detection | Threat Name | Link | Context |
---|---|---|---|---|---|---|
s-part-0017.t-0009.t-msedge.net | Get hash | malicious | RHADAMANTHYS | Browse |
| |
Get hash | malicious | LummaC, Vidar | Browse |
| ||
Get hash | malicious | Stealc | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | CredGrabber, Meduza Stealer | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
| ||
Get hash | malicious | Unknown | Browse |
| ||
Get hash | malicious | HTMLPhisher | Browse |
|
File type: | |
Entropy (8bit): | 5.5347812927186135 |
TrID: |
|
File name: | 172805100984c69ee107a8257c501a997cb4e1569ef6231158654d2046e773df31f3ca0cb6593.dat-decoded.exe |
File size: | 982'639 bytes |
MD5: | 5c5309a374fb55f69dc553784a6cd263 |
SHA1: | 6cb9f0c44c7cb36887fa2cfc38d63e0773b98912 |
SHA256: | a74d597f7740d12d4ec6fa74d14f0bba628eced82be37e2025605d7df374d51f |
SHA512: | 646d749ee4b0afd9ff9b5c7566d4e4a03836965d78d3eed1f8ca22fdd541bce63568d1305e7525bbb1407a591c897dc541e4bd25dea329a52cc77690373ac97a |
SSDEEP: | 12288:v2SYqkc3Uu+9td0UvoLKk5ceIX9viyGl5iw1xk2F91QK3pkxiHw8:vXYqHLIk5KNvkLhf |
TLSH: | C9253F326546CE57D15B0A71C05784F027A8AE7AE223D30F6449BF2DBC33FA1678794A |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...:m................0..r...*......~.... ........@.. ....................................@................................ |
Icon Hash: | 00928e8e8686b000 |
Entrypoint: | 0x4a907e |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE |
DLL Characteristics: | DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE |
Time Stamp: | 0xB3E06D3A [Tue Aug 18 14:01:30 2065 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: |
Instruction |
---|
cmpsb |
push edx |
or dword ptr [edx-2Bh], ebp |
xor byte ptr [esi], dh |
movsd |
cmp byte ptr [edi-7E615CC0h], bh |
xlatb |
sti |
jl 00007F7D10B1FB55h |
cmp dword ptr [edx-7800D065h], eax |
xor al, 8Eh |
inc ebx |
inc esp |
les ebx, esi |
jmp 00007F7CA52D5040h |
xor ah, byte ptr [esi-11C2DC3Eh] |
dec esp |
xchg eax, ebp |
or eax, dword ptr [edx-06h] |
ret |
dec esi |
or byte ptr [esi], ch |
mov eax, dword ptr [24D92866h] |
mov dl, 76h |
pop ebx |
mov byte ptr [D18B6D49h], al |
and eax, 64F6F872h |
xchg byte ptr [eax-68h], ch |
push ss |
aam A4h |
pop esp |
int3 |
pop ebp |
mov dh, 92h |
insb |
jo 00007F7D10B1FBBAh |
push eax |
std |
in eax, dx |
mov ecx, 46155EDAh |
push edi |
cmpsd |
lea ebx, dword ptr [ebp-54276F7Ch] |
add byte ptr [esp+edi*4-1B08F52Dh], cl |
pop eax |
add eax, 0645B3B8h |
shr byte ptr [esi+ebx], 1 |
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0xa9030 | 0x4b | .text |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0xaa000 | 0x42678 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0xee000 | 0xc | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x2000 | 0x8 | .text |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x2008 | 0x48 | .text |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | MD5 | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|---|
.text | 0x2000 | 0xa7084 | 0xa7200 | c550b6bd3725294a81e67cd258efa3be | False | 0.4244124555908751 | data | 5.8102288179522885 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ |
.rsrc | 0xaa000 | 0x42678 | 0x42800 | 5764d1fe246b6de8a5da45c6ee519fa0 | False | 0.12856849154135339 | data | 3.8425862913271103 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0xee000 | 0xc | 0x200 | 4e777d3cc4533b69a70d039097d9c0a3 | False | 0.064453125 | data | 1.5172084476244796 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Timestamp | Source IP | Dest IP | Trans ID | Reply Code | Name | CName | Address | Type | Class | DNS over HTTPS |
---|---|---|---|---|---|---|---|---|---|---|
Oct 4, 2024 16:44:18.050508022 CEST | 1.1.1.1 | 192.168.2.6 | 0xd424 | No error (0) | s-part-0017.t-0009.t-msedge.net | CNAME (Canonical name) | IN (0x0001) | false | ||
Oct 4, 2024 16:44:18.050508022 CEST | 1.1.1.1 | 192.168.2.6 | 0xd424 | No error (0) | 13.107.246.45 | A (IP address) | IN (0x0001) | false |