Analysis
-
max time kernel
530s -
max time network
447s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 14:04
Static task
static1
Behavioral task
behavioral1
Sample
WizWorm v4.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
WizWorm v4.rar
Resource
win10-20240221-en
Behavioral task
behavioral3
Sample
WizWorm v4.rar
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
WizWorm v4.rar
Resource
win11-20240221-en
General
-
Target
WizWorm v4.rar
-
Size
35.5MB
-
MD5
82f10a35d8425c3e46ef808972e73831
-
SHA1
ac0dca716e71e0aabc3d4ac41d85e3bac5448630
-
SHA256
1dcb5aba17ea2886a59f960d60dd23b5cb14112f046a0d8de6e6d589e96639d5
-
SHA512
f7ab8a440697c69a639465dba9772da837f4c9cd0ed8d7672aa3ca6dced3ceb6024277c80c5b17b0c76e47133689965858f54d211e454c44c2c4dd7c3f8ca50d
-
SSDEEP
786432:p+vcme8z2HYjCBbwIiEgBNVN7lDR+2FQGP1Rtn+FbzmeLc5vLN:Uc7HlsI6BNVsattPDeclN
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral3/files/0x000a000000023235-135.dat family_agenttesla behavioral3/memory/2816-136-0x000001727CED0000-0x000001727D0C4000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2816 WizWorm.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WizWorm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer WizWorm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion WizWorm.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe 2816 WizWorm.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 4712 7zFM.exe Token: 35 4712 7zFM.exe Token: SeSecurityPrivilege 4712 7zFM.exe Token: 33 4232 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 4232 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4712 7zFM.exe 4712 7zFM.exe 2816 WizWorm.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 2816 WizWorm.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3388 wrote to memory of 4712 3388 cmd.exe 93 PID 3388 wrote to memory of 4712 3388 cmd.exe 93
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\WizWorm v4.rar"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\WizWorm v4.rar"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4712
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5104
-
C:\Users\Admin\Desktop\WizWorm v4\WizWorm.exe"C:\Users\Admin\Desktop\WizWorm v4\WizWorm.exe"1⤵
- Executes dropped EXE
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2816
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3492
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x4a4 0x3081⤵
- Suspicious use of AdjustPrivilegeToken
PID:4232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD58ef41798df108ce9bd41382c9721b1c9
SHA11e6227635a12039f4d380531b032bf773f0e6de0
SHA256bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740
SHA5124c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b
-
Filesize
1.9MB
MD5bcc0fe2b28edd2da651388f84599059b
SHA144d7756708aafa08730ca9dbdc01091790940a4f
SHA256c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef
SHA5123bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8
-
Filesize
591KB
MD5d0b4077dc5623a51a8dd9fa37cafbf62
SHA19793779439a4e0bf5be28d1ff5e688dfb087c263
SHA2567ef5b1508c6187f45cb9803436238658f82ecbfe43ae3fffe5b0d22a86f79600
SHA512a94020fc4782a13b72f7729888f5ebc6e4d806a2b705bdeeae5305815d5fe177db57dd17b40c5cbeae0d8491f4f6a5e63e23485014ed8384358877b87b4cda71
-
Filesize
656KB
MD565ef4b23060128743cef937a43b82aa3
SHA1cc72536b84384ec8479b9734b947dce885ef5d31
SHA256c843869aaca5135c2d47296985f35c71ca8af4431288d04d481c4e46cc93ee26
SHA512d06690f9aac0c6500aed387f692b3305dfc0708b08fc2f27eaa44b108908ccd8267b07f8fb8608eef5c803039caeabf8f88a18b7e5b1d850f32bbb72bcd3b0b7
-
Filesize
345KB
MD534ea7f7d66563f724318e322ff08f4db
SHA1d0aa8038a92eb43def2fffbbf4114b02636117c5
SHA256c2c12d31b4844e29de31594fc9632a372a553631de0a0a04c8af91668e37cf49
SHA512dceb1f9435b9479f6aea9b0644ba8c46338a7f458c313822a9d9b3266d79af395b9b2797ed3217c7048db8b22955ec6fe8b0b1778077fa1de587123ad9e6b148
-
Filesize
704KB
MD5befe8e6e2ff58f1c9e19acf30f586b8a
SHA18d7752e54c8c47285dc292489ddc0c826027e806
SHA256a1cff5cea9034b950266101b79ffd6105d33059326c2042397c91c365c16c8da
SHA512428cabefea4a8bebf3565325f73cbb539ff08ea0637421fa7f7276e44a715b8b82c7736738307f6682960511bf08911153b4260db04cb38c93fbb47ac0dead5f