Analysis

  • max time kernel
    2s
  • max time network
    4s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 17:51

Errors

Reason
Machine shutdown: "{\"level\":\"info\",\"time\":\"2024-04-24T17:52:00Z\",\"message\":\"Dirty snapshot: /var/lib/sandbox/hatchvm/win10v2004-20240412-en/instance_7-dirty.qcow2\"}"

General

  • Target

    Aorist_Cracked.exe

  • Size

    2.8MB

  • MD5

    5963a9a271b685867ab6283af2cd1705

  • SHA1

    4dc28e29df30cb76aa397f35f86ea3dddcf529bd

  • SHA256

    5629694aa19e8320bb7bb5ce2d99b6996d7abc665d9e5ebf7e8330632b6f5f77

  • SHA512

    f7690f1bfbc2d77675dcfa046be24ca0f3ab8d6d383c65d7b22398a3d11004834a4367e6377319470e9a71e4d2acf6cce5de910ee6cbc04fe2400bdb72f684e8

  • SSDEEP

    49152:BITYbNbNWo4kSH3OqtwInrgBWBKH8jkDVFCNXODzWS9HfX0H:BIT4bNJFY3Oqt4+KH4kpc+DX/0H

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Aorist_Cracked.exe
    "C:\Users\Admin\AppData\Local\Temp\Aorist_Cracked.exe"
    1⤵
    • Enumerates system info in registry
    PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4472-1-0x0000000074CF0000-0x00000000754A0000-memory.dmp
    Filesize

    7.7MB

  • memory/4472-0-0x0000000000210000-0x00000000004DC000-memory.dmp
    Filesize

    2.8MB

  • memory/4472-2-0x0000000004DE0000-0x0000000004DF0000-memory.dmp
    Filesize

    64KB

  • memory/4472-3-0x00000000053C0000-0x0000000005964000-memory.dmp
    Filesize

    5.6MB

  • memory/4472-4-0x0000000004EF0000-0x0000000004F82000-memory.dmp
    Filesize

    584KB

  • memory/4472-5-0x0000000004F90000-0x0000000004F9A000-memory.dmp
    Filesize

    40KB

  • memory/4472-6-0x0000000005A70000-0x0000000005C84000-memory.dmp
    Filesize

    2.1MB

  • memory/4472-7-0x0000000005C80000-0x0000000006086000-memory.dmp
    Filesize

    4.0MB