Analysis
-
max time kernel
87s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 08:34
Static task
static1
General
-
Target
REX Obfuscator.exe
-
Size
4.1MB
-
MD5
6b5501b9e9a8ca4e53b3ea6f0d0f1db9
-
SHA1
19df7d4b6aabf5d72d3ffe89e4ec130ff1001124
-
SHA256
f3a45fdc397b1eec7c45664681d566cb68d36701c1f1754ddc2dcb9a439a70f8
-
SHA512
3970a9e72dcaf82acf0a32c2bceb3ab2bb87614d79e893a318fbc5971f41a310911037ce5c4081aaebb7084ba9747a5d8a020ac8032fbfc8c1c1aabaf6b888a9
-
SSDEEP
49152:kUUd3LmqgfVwPns0hPEwNYRjLDtAgEGiSKbKmdQxrOL79l523xLJcIF:kUUd3L9gt2h8IYRjL5AHFSKO5g9l520g
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2820-8-0x0000000006330000-0x0000000006542000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
Processes:
REX Obfuscator.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions REX Obfuscator.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
Processes:
REX Obfuscator.exedescription ioc process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools REX Obfuscator.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
REX Obfuscator.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion REX Obfuscator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion REX Obfuscator.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
REX Obfuscator.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum REX Obfuscator.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 REX Obfuscator.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
REX Obfuscator.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS REX Obfuscator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer REX Obfuscator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion REX Obfuscator.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
REX Obfuscator.exepid process 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe 2820 REX Obfuscator.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
REX Obfuscator.exedescription pid process Token: SeDebugPrivilege 2820 REX Obfuscator.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
REX Obfuscator.exepid process 2820 REX Obfuscator.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\REX Obfuscator.exe"C:\Users\Admin\AppData\Local\Temp\REX Obfuscator.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2820
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4120 --field-trial-handle=2588,i,4353937220825226770,7138584070663735671,262144 --variations-seed-version /prefetch:81⤵PID:1440