Analysis

  • max time kernel
    51s
  • max time network
    42s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240412-en
  • resource tags

    arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    26-04-2024 11:24

General

  • Target

    Dist.exe

  • Size

    3.6MB

  • MD5

    f361f816f04927b3141122a57f2f3f82

  • SHA1

    409cf10a30f668bcd1f6becdcc9089849b3d18ac

  • SHA256

    0a13e3279eca443d8e25bcc1c7e1bc6701fc4ab4dade37a7a52995a09f33ff39

  • SHA512

    f4aee7372d58f8099e6290375d92277a8e8c118941d9c3020bcaa88c8cac6df04b97832b5b412bffe27278e636aa53fd7e9315d473892aadf94a119377dbca02

  • SSDEEP

    98304:Ok5IT4bNJFY3Oqt/h+KH4kpc+DX/0H4feb5CE:Ok5jBHYYKYODJebgE

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dist.exe
    "C:\Users\Admin\AppData\Local\Temp\Dist.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1272
  • C:\Windows\System32\cmd.exe
    "C:\Windows\System32\cmd.exe"
    1⤵
      PID:3512

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1272-0-0x00000211B8F80000-0x00000211B9314000-memory.dmp
      Filesize

      3.6MB

    • memory/1272-1-0x00007FF8157B0000-0x00007FF816272000-memory.dmp
      Filesize

      10.8MB

    • memory/1272-2-0x00000211BB040000-0x00000211BB050000-memory.dmp
      Filesize

      64KB

    • memory/1272-3-0x00000211D3AE0000-0x00000211D3CF4000-memory.dmp
      Filesize

      2.1MB

    • memory/1272-4-0x00000211D3CF0000-0x00000211D40F6000-memory.dmp
      Filesize

      4.0MB

    • memory/1272-5-0x00000211BB040000-0x00000211BB050000-memory.dmp
      Filesize

      64KB

    • memory/1272-6-0x00000211BB040000-0x00000211BB050000-memory.dmp
      Filesize

      64KB

    • memory/1272-7-0x00007FF8157B0000-0x00007FF816272000-memory.dmp
      Filesize

      10.8MB