Analysis
-
max time kernel
81s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2023, 02:19
Behavioral task
behavioral1
Sample
Eclipse BETA.exe
Resource
win10v2004-20230221-en
General
-
Target
Eclipse BETA.exe
-
Size
22KB
-
MD5
ba7c345c6f2ec9b18a453c7382436737
-
SHA1
9e70e12a61c1ba3b01d41fd8c7e670f697e423ba
-
SHA256
47cb13c367f9ea1388c908049382721b1760c257afce0b6443b338f25f3b4594
-
SHA512
20bc340362c715710ef2e0b98361e77f56ab866804c690d96cb4279666ecb3d070af816e93044b136e1b2470c7c7cf823f021a29b4c5713e2e2fe69068ee1e8e
-
SSDEEP
384:buZxaYaRziTKLHtwr0vHzUJKq6faofAHaPjTJxqd32Q0ASrzWXYAsZi6YT/r:buZk1zj/zwKqsa0hMd32Q01foYTSDr
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/1760-149-0x0000000007460000-0x0000000007656000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Eclipse.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Eclipse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Eclipse.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation Eclipse BETA.exe -
resource yara_rule behavioral1/memory/1760-144-0x0000000000CE0000-0x0000000002074000-memory.dmp themida behavioral1/memory/1760-145-0x0000000000CE0000-0x0000000002074000-memory.dmp themida -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1760 Eclipse.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Eclipse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Eclipse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Eclipse.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1760 Eclipse.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1004 wrote to memory of 1760 1004 Eclipse BETA.exe 82 PID 1004 wrote to memory of 1760 1004 Eclipse BETA.exe 82 PID 1004 wrote to memory of 1760 1004 Eclipse BETA.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Eclipse BETA.exe"C:\Users\Admin\AppData\Local\Temp\Eclipse BETA.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\EclipseClient\Eclipse.exe"C:\Users\Admin\AppData\Local\Temp\EclipseClient\Eclipse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1760
-