Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
23-04-2024 15:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
skelly.cc.exe
Resource
win10-20240404-en
windows10-1703-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
skelly.cc.exe
Resource
win10v2004-20240412-en
windows10-2004-x64
12 signatures
150 seconds
General
-
Target
skelly.cc.exe
-
Size
2.1MB
-
MD5
08b8cc818d698d1d3e63f8f502b1ff0a
-
SHA1
5ca85f73c46698abb8b0e9c38f63cd2b37252640
-
SHA256
4c771772f4f1e3ada7f197d2b2627eb4dc329c21e98e6bbdf08d2514aed7ee0f
-
SHA512
f517bdeaf3b764f993a6a2195da45b3356825115fb75e90c6747e012bb6894676bfcb8e0641dbe1c49d2956a7b4646e01f1c43d3e0b5fc4e2bd508e8e2421a27
-
SSDEEP
49152:Pv+IuLD2KVQ/YY/cl2vthXw5McBeNXOKKVFGTlZ:Pv+1LDdQgYkl0thA5MnXeGT
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/4116-9-0x0000000006A30000-0x0000000006C44000-memory.dmp family_agenttesla -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4116 skelly.cc.exe 4116 skelly.cc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS skelly.cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer skelly.cc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion skelly.cc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4116 skelly.cc.exe 4116 skelly.cc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4116 skelly.cc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4116 skelly.cc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\skelly.cc.exe"C:\Users\Admin\AppData\Local\Temp\skelly.cc.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4116