Analysis
-
max time kernel
116s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2023 16:23
Static task
static1
Behavioral task
behavioral1
Sample
rosedrug skinchenger.exe
Resource
win10v2004-20231127-en
General
-
Target
rosedrug skinchenger.exe
-
Size
199.5MB
-
MD5
4cc9ee84d84aa89eb19fc10eedc7d0b2
-
SHA1
28e716558a1df19e2abe69e57836c19396c4e197
-
SHA256
88f97d02c5fbb0013bd24cbd90011cdfe2517c37c708b9d5a73536916a33c0e5
-
SHA512
219e871b744977e62714f126e8e39a6509424add60868a14ebae0e764ecc387bdee0b8a07a5a6a9e4d4979b63a7bf2b564e1007d365a411c37a085d497b2f3b0
-
SSDEEP
6291456:nytuS2G55555555555t55t555555555555555555555555555555555555555558:yES2sQ
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/1624-3-0x000002A5F5610000-0x000002A5F5806000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS rosedrug skinchenger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer rosedrug skinchenger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion rosedrug skinchenger.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 528 msedge.exe 528 msedge.exe 3016 msedge.exe 3016 msedge.exe 3504 identity_helper.exe 3504 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe 528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1624 wrote to memory of 528 1624 rosedrug skinchenger.exe 105 PID 1624 wrote to memory of 528 1624 rosedrug skinchenger.exe 105 PID 528 wrote to memory of 2764 528 msedge.exe 106 PID 528 wrote to memory of 2764 528 msedge.exe 106 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 4756 528 msedge.exe 108 PID 528 wrote to memory of 3016 528 msedge.exe 107 PID 528 wrote to memory of 3016 528 msedge.exe 107 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109 PID 528 wrote to memory of 4196 528 msedge.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\rosedrug skinchenger.exe"C:\Users\Admin\AppData\Local\Temp\rosedrug skinchenger.exe"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/TiehasSoft2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe47ae46f8,0x7ffe47ae4708,0x7ffe47ae47183⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:23⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:83⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:13⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:13⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:13⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:83⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:13⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:13⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:13⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:13⤵PID:1936
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57c89e9212e22e92acc3d335fe9a44fe6
SHA1c43c7e1b5fb58a40a01a6d8dd947c41a48e0b41f
SHA25618c46c863404b31fcce434662806fa34daff0f9af0a9379d898f772b5c398b44
SHA512c6961c171af63ddc7a72aaba4c9d910cc6a424794c416cd1ce51206f7c7f1100ca51c9e41d07d68489105dccded2294c1d761a8dc6be80d22c661014efd6a9ab
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5d6fed97a2e33655ee9c533093b493d03
SHA1b63087318fefdcf994f15b97c21ed567a6738cab
SHA256534c9351f8c4dcd9ab0f2f6702789d54a71cfa93eb3823019724a593436aeb4c
SHA51221255cf8138e4d6a479f55183517dd20d76882b7cc83c5adbc1f2ad0548dbd5252c13727a5164acfc4d198f152cece41f963384d83d06bd95b8bb1ae9114585e
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5f1bf3a10f45c45a1ffda0f4b434fe1f5
SHA17fb6756206fd3de5e134434e486a76819d4a6e5d
SHA256f9478cd136084001049197c84c64e531cbd28782055f0a94e892b189743b306e
SHA5129b87b46752122c6dffa6c5d216c276f0c1f27738e6cdec6f95ce39611a6280a3991fd6b86938f6accae3641bc50fdb04a714d81f92c6ae76907cca6149e2ead6
-
Filesize
5KB
MD5da1dd9e6f5306116e27bf751cf7e06ec
SHA15c087748e6f333e30c73165b10cde8085bbf0523
SHA2564562a939671b5b7e198d00910f85ee79f51852dc22d452d7f9db7cdf27c9f941
SHA512db2fdd4c98f21be97ae3d4c62a8bf27fed298d613887a59ada806f546f14da96ced2e96c3ef92187117b654f485325cbcfdd3b611504a75c3b5949fd5a033a5c
-
Filesize
24KB
MD5d7b2b29ef1d9a33e61e1167984c8ca3e
SHA19a0da1a3cf9003ecf6aba220a8a00ca34a7ebd34
SHA2567d4bbec0e8bf4e62f352750240a0bc0f7844d58fea590bc6a9fc972c3b752dc2
SHA5123cc40b7e35c0749e419b035a73768c8f76bace77ed44be6a59469a032b643da15162733e5aaa94064494b055858a24e4f79326a863f31f1c28eab44cec35cbec
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD540d9721f807cfa2d10c24039ef66e29b
SHA1c9d1d5196d4b7d8404bb5432e85a23edcca63339
SHA25659029911a306d7abb552284028aeda418bd0830c8e0e5b89c417e88bd820be50
SHA51260da4ba16e8d8636be715a9c031e1449483b8789cd32a376141c4f001cf41b610d9390ec420cbd8b016f37a25ee1f9144ca763d2d7d9994272fe06b63bb0aa1c
-
Filesize
11KB
MD5f1dd891c6a82719ef4c0776358406040
SHA10ab118fa397f4c47f369bec2809aed7132b6940f
SHA256b8ffb815ef646fe5159d309fa378ecd974c93ea2c08d362b45b97aeb90cfe0db
SHA5124a1c102a6202e6563c84f8417338cc2a8c7625bda6a5fc2033cc58cbb9d21289d35c00479e8bffd10e5182244a189f44a4863344235a4af2e90a7f4c242304cd