Analysis
-
max time kernel
27s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
10-12-2023 13:43
Static task
static1
Behavioral task
behavioral1
Sample
MEGA_UPDATED.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
MEGA_UPDATED.exe
Resource
win10v2004-20231130-en
Behavioral task
behavioral3
Sample
MEGA_UPDATED.exe
Resource
macos-20231201-en
General
-
Target
MEGA_UPDATED.exe
-
Size
3.4MB
-
MD5
7a2175a604e95018790d38067eba2a89
-
SHA1
e6023118821c117c2db23098e63b5dc50a4ded00
-
SHA256
4e378a7de4a63a76a966ac25f754337bdf511fb24964dbaac7c03ac73103891b
-
SHA512
3c91f92721fd937c78c54cedb74ee87356f0fb01a876b035333ad1a8ecfa63143685d8575145da7a9f48ece3fa1e81a751a6f8e2c6a9f26051375853094dfac8
-
SSDEEP
49152:RwvTHrg5igXalMD79PjYm3DMdQrp5ZVPEJXzR81XiGRuHDOXG:RIHrgt8RQrp5TMZRSSA0j
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/1456-5-0x000000001CC20000-0x000000001CE36000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS MEGA_UPDATED.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer MEGA_UPDATED.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion MEGA_UPDATED.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{20BE0001-9762-11EE-8260-66C04E06BBC8} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1154728922-3261336865-3456416385-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1456 MEGA_UPDATED.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2764 iexplore.exe 2764 iexplore.exe 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE 2836 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1456 wrote to memory of 2764 1456 MEGA_UPDATED.exe 28 PID 1456 wrote to memory of 2764 1456 MEGA_UPDATED.exe 28 PID 1456 wrote to memory of 2764 1456 MEGA_UPDATED.exe 28 PID 2764 wrote to memory of 2836 2764 iexplore.exe 30 PID 2764 wrote to memory of 2836 2764 iexplore.exe 30 PID 2764 wrote to memory of 2836 2764 iexplore.exe 30 PID 2764 wrote to memory of 2836 2764 iexplore.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\MEGA_UPDATED.exe"C:\Users\Admin\AppData\Local\Temp\MEGA_UPDATED.exe"1⤵
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://t.me/nerestpc_bot2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2764 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5134530147a64664f7e6449d9dfe0f3f3
SHA1a6452acd19905ff98e5052f07db79dc737465a30
SHA2560dc894f217dca709d041195f656367c9714b9ae64b7cbffba08761d3ce8494f8
SHA5120b9022c8241ff167049ce756b9003ab6abe0f409ecabc6e3305ab343bc5f80cd0d39cd84da574392e4a6a9f67447784d610ef2b6599a69b4b349d755a1026e10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5341c3c85bd2342165711c9c821799c67
SHA14b4eb83976e648113e69c753c6d7afb4677f45e2
SHA256704137f13dc6444c9ebd453f77130b44b4c5b6931da0da0741d50ce1a77266f1
SHA5129408d9e8c368f45ba44de4e51f22394c9e0c70f845005e694f36b008bc06aa25e48cfcbd81855e12514e313a3b059dc8b4d270e8b3fb85a1c6a4a48d1f4025e6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5e7b84113b93d5b38ac70eebb5da5f643
SHA18cbbba64b8610583a4200c9c6970f6f6fe66c15a
SHA25664b56e226aa48dbc11a247ce479371c177fb0c29e005655f08319d60be2746b3
SHA5127e8148183a3e2f0e91802094ffa47c67f5116ab09e29e16a68abb2c4859dda384d13d37fe5e81eb91d659c05ee9e1f2b27904531de24906b08a9d98c0bcd0b9f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f4713176125bf26b8949adb488968231
SHA1326fc2adb56957a320e9dcb75e4b9d627afee0a8
SHA25692c8203b24d49609ee725ab28d272ffcc4fb313847702acda2e77b17986a357d
SHA512987690c41a7ebccdbdc9d6359594a444abb9d01cd2222a2be0c75517e19ef199679758055e23364ed4c5207712e7935b92525fee5e04b4d49b411a430f52ac67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD56153cd43c8649747032f01b915f7fbe9
SHA16f900a24a8c6229b3206853275a4a9a2ae809d98
SHA256e12c47e98f1bb9c1d8e6039a8ee3eb7f695a03172a34ec19b64bb6ff590279ea
SHA5120b5f64258f7cd044255f7ceda981e10b24eb919785ae2293b51fcf29f09ca3249627ab51fe102e0e99397dd2a48ba65cf6bcc90c2a0b5c9438f9fa4739c9b31d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD55e4691bc5973edb11eb2914108ed53ab
SHA112564b4e4ee6f6d0f95a43133ae20771394b0205
SHA256b0bb8d20a7c8a36e05142fc6123316591dee7335d46cfe1ebd192f7775d92115
SHA512fe02e1ba380d264dd2611405fca178703669bcf27e959560a34ed42071fc30ee02cd28299214573ce3a1432c36c7a3729e0a3fbbb8ad9beb20e3f35d2ee3da8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ceac2e14207703e26e6a72f6fe304f25
SHA124cffc2bdfb003fa836c3fdcef38c476ba598c19
SHA256989aaa0c02e32288543cdd5f7f27bc333a3b2c76896735f8382e360d7594fe6f
SHA512a787cd69dfdb7f486c84d9658a8e9d280428e8e5782b7ed39a6285562603f337cd6ef887834d6997d8adf3a0c1846152052fc78fa8215cedcb815b1fc7b117b3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD54f73e17f794ae295dac87962fc27d9ef
SHA12a657ea762a7e445248f13f4c5f21ff405512a51
SHA2566e93772a8b7738ced52bc16b95de4af87c2652d61a0df7e04bd0d4b07c4802e3
SHA512570cd18aa62d6933decd667ec7ac9053d1f782cde5de25c8787e17f754dd68f281a22abb9dbe1dae07934565f5421bfae655409b3b53db63fbde53cd5479c605
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5798f00f7ac49f6475e6a5ec92dbb825f
SHA15220cdeb0c1bdcfa1fde47c52c95f4de63aa7440
SHA256cf7f134613f567b072396aae2b52544c51a257c4c4b90072558bbae28ff05169
SHA5122f6ee4d6eb1fd15226f11b6552259aa1f09a47c1c8e3baaba911ef419df882d776855675c0686bf3f4cdcd8e7deef6dc658414803bc5e1f76fb0b9816a62e560
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06