Analysis
-
max time kernel
88s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-05-2024 12:30
Static task
static1
General
-
Target
CheatoSpoofer.exe
-
Size
31.7MB
-
MD5
d55cc4db0fc8dbffe183f78205ec03fa
-
SHA1
f02664f6276a1b88ecb14efb4e7c7d9b0747c7d6
-
SHA256
a3c5ad53ca0367b79c56cb0dc0c42484b9a4e7fa77290ca6ec233f94cacf1e8b
-
SHA512
b26aaae019111d5e23fb293de30380646770dcd31e146edfaff37904f5dc78ac2504050d647d4f212ad42f14a9193a7dc6ef7171f30f356b023fd129e94ec251
-
SSDEEP
786432:0lH0ByeGkm9QxG774aXrKE/Awx7PL/PlTe0P98qtyXU:s6yesGWnbK5EPL/PlCk60q
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 9 IoCs
Processes:
resource yara_rule behavioral1/memory/3644-11-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-12-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-16-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-17-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-18-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-19-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-56-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-89-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 behavioral1/memory/3644-76-0x0000000000970000-0x0000000005362000-memory.dmp family_zgrat_v1 -
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3644-64-0x00000163FB1C0000-0x00000163FB3B6000-memory.dmp family_agenttesla -
Loads dropped DLL 1 IoCs
Processes:
CheatoSpoofer.exepid process 3644 CheatoSpoofer.exe -
Obfuscated with Agile.Net obfuscator 9 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/3644-11-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-12-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-16-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-17-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-18-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-19-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-56-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-89-0x0000000000970000-0x0000000005362000-memory.dmp agile_net behavioral1/memory/3644-76-0x0000000000970000-0x0000000005362000-memory.dmp agile_net -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
CheatoSpoofer.exepid process 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
CheatoSpoofer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS CheatoSpoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer CheatoSpoofer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion CheatoSpoofer.exe -
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
CheatoSpoofer.exepid process 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe 3644 CheatoSpoofer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
CheatoSpoofer.exedescription pid process Token: SeDebugPrivilege 3644 CheatoSpoofer.exe Token: SeSystemEnvironmentPrivilege 3644 CheatoSpoofer.exe Token: SeSecurityPrivilege 3644 CheatoSpoofer.exe Token: SeTakeOwnershipPrivilege 3644 CheatoSpoofer.exe Token: SeBackupPrivilege 3644 CheatoSpoofer.exe Token: SeRestorePrivilege 3644 CheatoSpoofer.exe Token: SeShutdownPrivilege 3644 CheatoSpoofer.exe Token: SeDebugPrivilege 3644 CheatoSpoofer.exe Token: SeAuditPrivilege 3644 CheatoSpoofer.exe Token: SeSystemEnvironmentPrivilege 3644 CheatoSpoofer.exe Token: SeManageVolumePrivilege 3644 CheatoSpoofer.exe Token: SeImpersonatePrivilege 3644 CheatoSpoofer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 2300 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\CheatoSpoofer.exe"C:\Users\Admin\AppData\Local\Temp\CheatoSpoofer.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226KB
MD5519f34494d7484d85ecfad85f23bac05
SHA18f1be6ce8501ca1def6d02fde760d48169677bc5
SHA2561f7a51dd23092e70b8e323c86229de242568ffc7d27271aaf88d051662ba32f9
SHA512d9e34321e6d32c5da664200bb5609bb2d19fcd44d36f8109e7ad2e44b5dbf1cb46e3d5b8c529d90f051e6f4cc2891301f213c9d3faac8fc4a0f3b0b8d9a3f81b
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82