Analysis

  • max time kernel
    24s
  • max time network
    206s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    13-05-2024 13:26

General

  • Target

    Byte Guard Free.exe

  • Size

    2.4MB

  • MD5

    32eee970bec927fd068197918edac5a4

  • SHA1

    8aa4820931aa228856f12fc516f886dab4d12e28

  • SHA256

    53eeff9f4fa0473d90cf4abe978ff60d5898d2527924a593ef877303cab88a5b

  • SHA512

    d47d2fbc9d4b9a47d0b5b1076aaa89b20ba72a9625e9fcfd57f000bc14abc11aff60123667bbb6998fa5bdff65b7207f410cc6008207fc2362db1d99c80afbe8

  • SSDEEP

    49152:3Ls8e8SkGMITYbNbNWo4kSH3OqtwI2MrBm6w30IfRaRf:3PecGMIT4bNJFY3OqtxdmDDJef

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 6 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Byte Guard Free.exe
    "C:\Users\Admin\AppData\Local\Temp\Byte Guard Free.exe"
    1⤵
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4592
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2432
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:776
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1016
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1008
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:3972
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:4932
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1348
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    PID:4696
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\#!002\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

    Filesize

    4KB

    MD5

    1bfe591a4fe3d91b03cdf26eaacd8f89

    SHA1

    719c37c320f518ac168c86723724891950911cea

    SHA256

    9cf94355051bf0f4a45724ca20d1cc02f76371b963ab7d1e38bd8997737b13d8

    SHA512

    02f88da4b610678c31664609bcfa9d61db8d0b0617649981af948f670f41a6207b4ec19fecce7385a24e0c609cbbf3f2b79a8acaf09a03c2c432cc4dce75e9db

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\AKM4261H\favicon[1].ico

    Filesize

    23KB

    MD5

    ec2c34cadd4b5f4594415127380a85e6

    SHA1

    e7e129270da0153510ef04a148d08702b980b679

    SHA256

    128e20b3b15c65dd470cb9d0dc8fe10e2ff9f72fac99ee621b01a391ef6b81c7

    SHA512

    c1997779ff5d0f74a7fbb359606dab83439c143fbdb52025495bdc3a7cb87188085eaf12cc434cbf63b3f8da5417c8a03f2e64f751c0a63508e4412ea4e7425c

  • memory/1008-53-0x00000228EEA40000-0x00000228EEB40000-memory.dmp

    Filesize

    1024KB

  • memory/1348-247-0x000002A64C900000-0x000002A64C920000-memory.dmp

    Filesize

    128KB

  • memory/1348-243-0x000002A65CE50000-0x000002A65CF50000-memory.dmp

    Filesize

    1024KB

  • memory/1348-240-0x000002A64BB20000-0x000002A64BC20000-memory.dmp

    Filesize

    1024KB

  • memory/1348-226-0x000002A64B5C0000-0x000002A64B5E0000-memory.dmp

    Filesize

    128KB

  • memory/2432-45-0x0000027405980000-0x0000027405982000-memory.dmp

    Filesize

    8KB

  • memory/2432-187-0x00000274085C0000-0x00000274085C1000-memory.dmp

    Filesize

    4KB

  • memory/2432-186-0x00000274085B0000-0x00000274085B1000-memory.dmp

    Filesize

    4KB

  • memory/2432-10-0x0000027401620000-0x0000027401630000-memory.dmp

    Filesize

    64KB

  • memory/2432-26-0x0000027401720000-0x0000027401730000-memory.dmp

    Filesize

    64KB

  • memory/3972-70-0x000001C9CB600000-0x000001C9CB700000-memory.dmp

    Filesize

    1024KB

  • memory/3972-173-0x000001C9E06A0000-0x000001C9E07A0000-memory.dmp

    Filesize

    1024KB

  • memory/3972-178-0x000001C9DFC10000-0x000001C9DFD10000-memory.dmp

    Filesize

    1024KB

  • memory/3972-125-0x000001C9DC720000-0x000001C9DC722000-memory.dmp

    Filesize

    8KB

  • memory/3972-123-0x000001C9DC600000-0x000001C9DC602000-memory.dmp

    Filesize

    8KB

  • memory/3972-121-0x000001C9DC5E0000-0x000001C9DC5E2000-memory.dmp

    Filesize

    8KB

  • memory/4592-7-0x0000000006B70000-0x0000000006B7A000-memory.dmp

    Filesize

    40KB

  • memory/4592-0-0x0000000073A5E000-0x0000000073A5F000-memory.dmp

    Filesize

    4KB

  • memory/4592-8-0x0000000073A50000-0x000000007413E000-memory.dmp

    Filesize

    6.9MB

  • memory/4592-9-0x00000000098B0000-0x00000000098EE000-memory.dmp

    Filesize

    248KB

  • memory/4592-6-0x0000000006850000-0x0000000006A64000-memory.dmp

    Filesize

    2.1MB

  • memory/4592-203-0x0000000073A5E000-0x0000000073A5F000-memory.dmp

    Filesize

    4KB

  • memory/4592-5-0x0000000005760000-0x0000000005772000-memory.dmp

    Filesize

    72KB

  • memory/4592-4-0x0000000073A50000-0x000000007413E000-memory.dmp

    Filesize

    6.9MB

  • memory/4592-3-0x0000000005640000-0x00000000056D2000-memory.dmp

    Filesize

    584KB

  • memory/4592-2-0x0000000005CA0000-0x000000000619E000-memory.dmp

    Filesize

    5.0MB

  • memory/4592-1-0x0000000000B10000-0x0000000000D88000-memory.dmp

    Filesize

    2.5MB