Analysis Overview
SHA256
ce1a229b0d929549e02d1745c45c8ab2b2ea59d245ecfcee07ced334f2cc994b
Threat Level: Known bad
The file KASHI REGEDIT AIMBOT PLAN.exe was found to be: Known bad.
Malicious Activity Summary
AgentTesla
AgentTesla payload
Obfuscated with Agile.Net obfuscator
Suspicious use of NtSetInformationThreadHideFromDebugger
Unsigned PE
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Enumerates system info in registry
Suspicious use of SetWindowsHookEx
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-03-17 22:32
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-03-17 22:32
Reported
2024-03-17 22:33
Platform
win7-20240221-en
Max time kernel
15s
Max time network
16s
Command Line
Signatures
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
Enumerates physical storage devices
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1940 wrote to memory of 2056 | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | C:\Windows\System32\cmd.exe |
| PID 1940 wrote to memory of 2056 | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | C:\Windows\System32\cmd.exe |
| PID 1940 wrote to memory of 2056 | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | C:\Windows\System32\cmd.exe |
| PID 2056 wrote to memory of 2640 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\system32\choice.exe |
| PID 2056 wrote to memory of 2640 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\system32\choice.exe |
| PID 2056 wrote to memory of 2640 | N/A | C:\Windows\System32\cmd.exe | C:\Windows\system32\choice.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe
"C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe"
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\50623B4C.dll" /A:H
C:\Windows\system32\choice.exe
choice /C Y /N /D Y /T 3
Network
Files
memory/1940-0-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp
memory/1940-1-0x00000000010E0000-0x0000000002B74000-memory.dmp
memory/1940-2-0x000000001D5D0000-0x000000001D650000-memory.dmp
memory/1940-6-0x000000001D930000-0x000000001DAAC000-memory.dmp
memory/1940-8-0x000000001D5D0000-0x000000001D650000-memory.dmp
memory/1940-9-0x000000001D5D0000-0x000000001D650000-memory.dmp
memory/1940-10-0x0000000000570000-0x0000000000576000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\50623B4C.dll
| MD5 | cd30d9f2f1b25be64d898b24b2d5f260 |
| SHA1 | 78578481a8f3d1eb3f318bb4e90665a9faa73669 |
| SHA256 | c4533be5e746b773fb5295b3440d8aa9c179e6f7220284cb62d9ba9a5a6f1dbf |
| SHA512 | 342896ccd80d497254c488774e93aecc3933cca4733a8891ec4dc59373cd0520ee472ba066900f8ef359a1d3ddde2ac183cb3ac0383355ccc04cd6455444d436 |
memory/1940-12-0x000007FEF51D0000-0x000007FEF5BBC000-memory.dmp
Analysis: behavioral2
Detonation Overview
Submitted
2024-03-17 22:32
Reported
2024-03-17 22:33
Platform
win10v2004-20240226-en
Max time kernel
17s
Max time network
24s
Command Line
Signatures
AgentTesla
AgentTesla payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Obfuscated with Agile.Net obfuscator
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of NtSetInformationThreadHideFromDebugger
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
| Token: SeTcbPrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\system32\svchost.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3180 wrote to memory of 2736 | N/A | C:\Windows\system32\svchost.exe | C:\Windows\system32\dashost.exe |
| PID 3180 wrote to memory of 2736 | N/A | C:\Windows\system32\svchost.exe | C:\Windows\system32\dashost.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe
"C:\Users\Admin\AppData\Local\Temp\KASHI REGEDIT AIMBOT PLAN.exe"
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
C:\Windows\system32\dashost.exe
dashost.exe {8e2aeb1c-c4c5-4e98-ae08ade0e6432ba8}
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 0.205.248.87.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.154.82.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.bing.com | udp |
| US | 204.79.197.200:443 | g.bing.com | tcp |
| US | 8.8.8.8:53 | 200.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 41.110.16.96.in-addr.arpa | udp |
| US | 8.8.8.8:53 | c.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa | udp |
| US | 8.8.8.8:53 | 203.197.79.204.in-addr.arpa | udp |
| US | 8.8.8.8:53 | keyauth.win | udp |
| US | 104.26.1.5:443 | keyauth.win | tcp |
| US | 8.8.8.8:53 | 5.1.26.104.in-addr.arpa | udp |
Files
memory/1512-0-0x00007FFCA99F0000-0x00007FFCAA4B1000-memory.dmp
memory/1512-1-0x00000212515A0000-0x0000021253034000-memory.dmp
memory/1512-2-0x000002126D500000-0x000002126D510000-memory.dmp
memory/1512-6-0x000002126D7A0000-0x000002126D91C000-memory.dmp
memory/1512-9-0x0000021253410000-0x0000021253411000-memory.dmp
memory/1512-8-0x0000021253410000-0x0000021253411000-memory.dmp
memory/1512-10-0x0000021253410000-0x0000021253416000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\50623B4C.dll
| MD5 | cd30d9f2f1b25be64d898b24b2d5f260 |
| SHA1 | 78578481a8f3d1eb3f318bb4e90665a9faa73669 |
| SHA256 | c4533be5e746b773fb5295b3440d8aa9c179e6f7220284cb62d9ba9a5a6f1dbf |
| SHA512 | 342896ccd80d497254c488774e93aecc3933cca4733a8891ec4dc59373cd0520ee472ba066900f8ef359a1d3ddde2ac183cb3ac0383355ccc04cd6455444d436 |
memory/1512-12-0x0000021253460000-0x0000021253472000-memory.dmp
memory/1512-13-0x000002126D760000-0x000002126D79C000-memory.dmp
memory/1512-14-0x000002126DB20000-0x000002126DF26000-memory.dmp
memory/1512-15-0x000002126E0B0000-0x000002126E2A6000-memory.dmp
memory/1512-16-0x000002126D500000-0x000002126D510000-memory.dmp
memory/1512-17-0x000002126D500000-0x000002126D510000-memory.dmp
memory/1512-18-0x000002126D500000-0x000002126D510000-memory.dmp
memory/1512-19-0x00007FFCA99F0000-0x00007FFCAA4B1000-memory.dmp