Analysis

  • max time kernel
    116s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231127-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-12-2023 16:23

General

  • Target

    rosedrug skinchenger.exe

  • Size

    199.5MB

  • MD5

    4cc9ee84d84aa89eb19fc10eedc7d0b2

  • SHA1

    28e716558a1df19e2abe69e57836c19396c4e197

  • SHA256

    88f97d02c5fbb0013bd24cbd90011cdfe2517c37c708b9d5a73536916a33c0e5

  • SHA512

    219e871b744977e62714f126e8e39a6509424add60868a14ebae0e764ecc387bdee0b8a07a5a6a9e4d4979b63a7bf2b564e1007d365a411c37a085d497b2f3b0

  • SSDEEP

    6291456:nytuS2G55555555555t55t555555555555555555555555555555555555555558:yES2sQ

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rosedrug skinchenger.exe
    "C:\Users\Admin\AppData\Local\Temp\rosedrug skinchenger.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/TiehasSoft
      2⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe47ae46f8,0x7ffe47ae4708,0x7ffe47ae4718
        3⤵
          PID:2764
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:3
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3016
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
          3⤵
            PID:4756
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:8
            3⤵
              PID:4196
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:1
              3⤵
                PID:3136
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
                3⤵
                  PID:2480
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4456 /prefetch:1
                  3⤵
                    PID:3788
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                    3⤵
                      PID:3928
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:8
                      3⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:3504
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:1
                      3⤵
                        PID:2580
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:1
                        3⤵
                          PID:3240
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                          3⤵
                            PID:2156
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15779159839876632857,1769775520986326472,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                            3⤵
                              PID:1936
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:688
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:1560

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                              Filesize

                              152B

                              MD5

                              7c89e9212e22e92acc3d335fe9a44fe6

                              SHA1

                              c43c7e1b5fb58a40a01a6d8dd947c41a48e0b41f

                              SHA256

                              18c46c863404b31fcce434662806fa34daff0f9af0a9379d898f772b5c398b44

                              SHA512

                              c6961c171af63ddc7a72aaba4c9d910cc6a424794c416cd1ce51206f7c7f1100ca51c9e41d07d68489105dccded2294c1d761a8dc6be80d22c661014efd6a9ab

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                              Filesize

                              72B

                              MD5

                              d6fed97a2e33655ee9c533093b493d03

                              SHA1

                              b63087318fefdcf994f15b97c21ed567a6738cab

                              SHA256

                              534c9351f8c4dcd9ab0f2f6702789d54a71cfa93eb3823019724a593436aeb4c

                              SHA512

                              21255cf8138e4d6a479f55183517dd20d76882b7cc83c5adbc1f2ad0548dbd5252c13727a5164acfc4d198f152cece41f963384d83d06bd95b8bb1ae9114585e

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                              Filesize

                              111B

                              MD5

                              285252a2f6327d41eab203dc2f402c67

                              SHA1

                              acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                              SHA256

                              5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                              SHA512

                              11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              f1bf3a10f45c45a1ffda0f4b434fe1f5

                              SHA1

                              7fb6756206fd3de5e134434e486a76819d4a6e5d

                              SHA256

                              f9478cd136084001049197c84c64e531cbd28782055f0a94e892b189743b306e

                              SHA512

                              9b87b46752122c6dffa6c5d216c276f0c1f27738e6cdec6f95ce39611a6280a3991fd6b86938f6accae3641bc50fdb04a714d81f92c6ae76907cca6149e2ead6

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                              Filesize

                              5KB

                              MD5

                              da1dd9e6f5306116e27bf751cf7e06ec

                              SHA1

                              5c087748e6f333e30c73165b10cde8085bbf0523

                              SHA256

                              4562a939671b5b7e198d00910f85ee79f51852dc22d452d7f9db7cdf27c9f941

                              SHA512

                              db2fdd4c98f21be97ae3d4c62a8bf27fed298d613887a59ada806f546f14da96ced2e96c3ef92187117b654f485325cbcfdd3b611504a75c3b5949fd5a033a5c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                              Filesize

                              24KB

                              MD5

                              d7b2b29ef1d9a33e61e1167984c8ca3e

                              SHA1

                              9a0da1a3cf9003ecf6aba220a8a00ca34a7ebd34

                              SHA256

                              7d4bbec0e8bf4e62f352750240a0bc0f7844d58fea590bc6a9fc972c3b752dc2

                              SHA512

                              3cc40b7e35c0749e419b035a73768c8f76bace77ed44be6a59469a032b643da15162733e5aaa94064494b055858a24e4f79326a863f31f1c28eab44cec35cbec

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                              Filesize

                              16B

                              MD5

                              6752a1d65b201c13b62ea44016eb221f

                              SHA1

                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                              SHA256

                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                              SHA512

                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              40d9721f807cfa2d10c24039ef66e29b

                              SHA1

                              c9d1d5196d4b7d8404bb5432e85a23edcca63339

                              SHA256

                              59029911a306d7abb552284028aeda418bd0830c8e0e5b89c417e88bd820be50

                              SHA512

                              60da4ba16e8d8636be715a9c031e1449483b8789cd32a376141c4f001cf41b610d9390ec420cbd8b016f37a25ee1f9144ca763d2d7d9994272fe06b63bb0aa1c

                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                              Filesize

                              11KB

                              MD5

                              f1dd891c6a82719ef4c0776358406040

                              SHA1

                              0ab118fa397f4c47f369bec2809aed7132b6940f

                              SHA256

                              b8ffb815ef646fe5159d309fa378ecd974c93ea2c08d362b45b97aeb90cfe0db

                              SHA512

                              4a1c102a6202e6563c84f8417338cc2a8c7625bda6a5fc2033cc58cbb9d21289d35c00479e8bffd10e5182244a189f44a4863344235a4af2e90a7f4c242304cd

                            • memory/1624-5-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-11-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-10-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-9-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-8-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-7-0x00007FFE462C0000-0x00007FFE46D81000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1624-4-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-0-0x00007FFE462C0000-0x00007FFE46D81000-memory.dmp

                              Filesize

                              10.8MB

                            • memory/1624-6-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-3-0x000002A5F5610000-0x000002A5F5806000-memory.dmp

                              Filesize

                              2.0MB

                            • memory/1624-2-0x000002A5F5520000-0x000002A5F5530000-memory.dmp

                              Filesize

                              64KB

                            • memory/1624-1-0x000002A5E6650000-0x000002A5E7650000-memory.dmp

                              Filesize

                              16.0MB