Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe

Overview

General Information

Sample name:1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe
Analysis ID:1526395
MD5:e68bdd79dc5c7552bbd46d20d173e76c
SHA1:1308243c9904b448f739439480c9e03034d42d7b
SHA256:9f8eaa30544621fb719139ab4d51951ce5d842bf6e4c4f18bd3df9a1776c35a5
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.

Detection

PureLog Stealer, zgRAT
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
PE file contains section with special chars
Binary contains a suspicious time stamp
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
    1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeMALWARE_Win_zgRATDetects zgRATditekSHen
      • 0x5b59d:$s1: file:///
      • 0x5b4d5:$s2: {11111-22222-10009-11112}
      • 0x5b52d:$s3: {11111-22222-50001-00000}
      • 0x57dfb:$s4: get_Module
      • 0x51900:$s5: Reverse
      • 0x52876:$s6: BlockCopy
      • 0x5193f:$s7: ReadByte
      • 0x5b5af:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
      No Sigma rule has matched
      No Suricata rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeAvira: detected
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeReversingLabs: Detection: 15%
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeVirustotal: Detection: 20%Perma Link
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

      System Summary

      barindex
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe, type: SAMPLEMatched rule: Detects zgRAT Author: ditekSHen
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: section name: @.relo
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: section name: `.rsrc
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: No import functions for PE file found
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeBinary or memory string: OriginalFilenameHereaway.exe" vs 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe, type: SAMPLEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE size: 0x4c000680 address: 0x0
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC size: 0xc000940 address: 0x0
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT size: 0x8000020 address: 0x0
      Source: classification engineClassification label: mal84.troj.winEXE@0/0@0/0
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeReversingLabs: Detection: 15%
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeVirustotal: Detection: 20%
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: 0xC0815A83 [Thu May 5 19:39:47 2072 UTC]
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: real checksum: 0x2 should be: 0x9bc3b
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: section name: @.relo
      Source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exeStatic PE information: section name: `.rsrc

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe, type: SAMPLE
      Source: Yara matchFile source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe, type: SAMPLE

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe, type: SAMPLE
      Source: Yara matchFile source: 1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe, type: SAMPLE
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath Interception1
      Timestomp
      OS Credential DumpingSystem Service DiscoveryRemote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe16%ReversingLabs
      1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe21%VirustotalBrowse
      1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe100%AviraTR/Crypt.XPACK.Gen
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      s-part-0017.t-0009.t-msedge.net0%VirustotalBrowse
      No Antivirus matches
      NameIPActiveMaliciousAntivirus DetectionReputation
      s-part-0017.t-0009.t-msedge.net
      13.107.246.45
      truefalseunknown
      No contacted IP infos
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1526395
      Start date and time:2024-10-05 15:01:10 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 1m 35s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:1
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe
      Detection:MAL
      Classification:mal84.troj.winEXE@0/0@0/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Unable to launch sample, stop analysis
      • No process behavior to analyse as no analysis process or sample was found
      • Corrupt sample or wrongly selected analyzer. Details: %1 is not a valid Win32 application.
      • Exclude process from analysis (whitelisted): dllhost.exe
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net
      No simulations
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      s-part-0017.t-0009.t-msedge.nethttps://wide-loads.powerappsportals.com/Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      LuJJk0US5g.msiGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://cedars-sinai-enterprise.dicomgrid.com/worklist/Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      rfc[1].htmlGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      file.exeGet hashmaliciousLummaC, VidarBrowse
      • 13.107.246.45
      https://href.li/?https://CYT.sprenumen.ru/wJPIeL/#I#Ws-amclean@lwsd.orgGet hashmaliciousTycoon2FABrowse
      • 13.107.246.45
      https://rolledalloys12-dot-wind-blade-416540.uk.r.appspot.com/Get hashmaliciousHTMLPhisherBrowse
      • 13.107.246.45
      Play_VM-Now(Gdunphy)CQDM.htmGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      https://url.avanan.click/v2/r01/___https://www.tiktok.com/qnspdA7?fni=6cbb&qfsl=js&xhjsj=gnt_zwq&yfwljy=myyux:ddBBB.lttlqj.hfdzwq?v=frudxdxlqwif.htrd.iwtlt___.YXAzOnNvdXRoZXJua2l0Y2hlbmFuZGdyaWxsOmE6bzoxZWJhNTM5MDhjODJhZTYyM2M5MDM3ZjkwZTI3ZjliZjo3OmUzYTI6MjUxYmEwYmY4MzRlNGZkNWNiNzBlNGJiNmNiNGQwZTMxZDYzMWE0ZGZkZmVmYWQ0MmJkNGQxNGZjNzZiYzQ0MTpoOlQ6VA#am9uYXRoYW5fbW9vcmVAdHJla2Jpa2VzLmNvbQ==Get hashmaliciousUnknownBrowse
      • 13.107.246.45
      http://nirothniroth.site/?p=22&fbclid=IwY2xjawFs_DdleHRuA2FlbQIxMQABHTdgZU6ok722L5RxKPR-zh7Gkm6BqZ8BcT950y1bxf6l0LKz0zslg7KJHw_aem__ldVm1UUndXAkwYRakjBzgGet hashmaliciousUnknownBrowse
      • 13.107.246.45
      No context
      No context
      No context
      No created / dropped files found
      File type:PE32 executable Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):5.983174911562971
      TrID:
      • Generic Win/DOS Executable (2004/3) 49.94%
      • DOS Executable Generic (2002/1) 49.89%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
      File name:1728051008f48e3fb51c0c2d66f1f52c855098dd735b8d00916f5849ed0a74beb0756c0876857.dat-decoded.exe
      File size:610'835 bytes
      MD5:e68bdd79dc5c7552bbd46d20d173e76c
      SHA1:1308243c9904b448f739439480c9e03034d42d7b
      SHA256:9f8eaa30544621fb719139ab4d51951ce5d842bf6e4c4f18bd3df9a1776c35a5
      SHA512:0c9fda5ba4f1e133e0d2aacf6a0a85d63eaf43101fe8d02e19bc7bce05f97ba0c8f76a47e2e4e6196739d6f7d04a0d8502a7fb5f480a001f18d6b574df36eb80
      SSDEEP:12288:xkCnObqPNHDIWbu+aaQ0OTXp5kOWA+ov0K5iG4jU:lnO+P9Od0OTXp5kOWA+ovNK
      TLSH:AAD43A137BA9CEC2D17903F9E491866027B5E94D6023FB9F54BE2A21FAD33217C02D56
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....Z................0..N.....:........l... ........@.. .......................`............@.............................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x9e000680
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x680
      Subsystem:unknown
      Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      DLL Characteristics:NX_COMPAT, NO_ISOLATION
      Time Stamp:0xC0815A83 [Thu May 5 19:39:47 2072 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:2
      OS Version Minor:1024
      File Version Major:2
      File Version Minor:1024
      Subsystem Version Major:2
      Subsystem Version Minor:1024
      Import Hash:
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_IMPORT0x500000000x4b00066c.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x4c000680
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x2bb0x0@.relo
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00xc000940
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_IAT0x00x8000020@.relo
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0@.relo
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x80000000x48000020.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0@.relo
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      @.relo0x00xc0000630x94023c207019ac39c88f308b71e0fe6fe01unknownunknownunknownunknownIMAGE_SCN_MEM_READ
      `.rsrc0x2bb0x4c0000000x680c10a591fd4ca328bcc0879c112dd2cd1unknownunknownunknownunknownIMAGE_SCN_MEM_READ
      .text0x64c0xa40000000x205eb34ff8f1f6e7a274341195f804c24aunknownunknownunknownunknownIMAGE_SCN_MEM_EXECUTE
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Oct 5, 2024 15:02:12.361577034 CEST1.1.1.1192.168.2.60x781cNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
      Oct 5, 2024 15:02:12.361577034 CEST1.1.1.1192.168.2.60x781cNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
      No statistics
      No system behavior
      No disassembly