Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
21-05-2024 22:21
Static task
static1
Behavioral task
behavioral1
Sample
WZAgent.exe
Resource
win7-20240419-en
General
-
Target
WZAgent.exe
-
Size
9.4MB
-
MD5
86137e9ed8313472f22f6e523d8ad219
-
SHA1
49e66323a9ad23e49569edfb0f4ca2d3c67ef61b
-
SHA256
e25599248cbab0ee17db46769aefac345098d9a066192f89c0072a38c726f50a
-
SHA512
f06d574d3a5040303ef9a246a73163675169f8e5086835279a376ab14442f3f38afe70ea31fc68357845e28e3872e94e9b8f67694a3b6fc288d5b85d7d2975d6
-
SSDEEP
196608:/ntsxE5JupJ6XmXIY3AmEXxeA32ngfgZ5Kv+yWGqL+aewN8L:/nts+Upam4OAmEXn4Z5C+RLN
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2428-6-0x000000001E0C0000-0x000000001E2B2000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
WZAgent.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZAgent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZAgent.exe -
Executes dropped EXE 2 IoCs
Processes:
ZipExtractor.exeWZAgent.exepid process 2744 ZipExtractor.exe 2100 WZAgent.exe -
Loads dropped DLL 2 IoCs
Processes:
ZipExtractor.exeWZAgent.exepid process 2744 ZipExtractor.exe 2100 WZAgent.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2100-34-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net behavioral1/memory/2100-35-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\WZAgent.exe themida behavioral1/memory/2100-34-0x0000000000400000-0x00000000023C0000-memory.dmp themida behavioral1/memory/2100-35-0x0000000000400000-0x00000000023C0000-memory.dmp themida \Users\Admin\AppData\Local\Temp\67086c7f-8595-4935-b455-2a765bd8e033\AgileDotNetRT64.dll themida behavioral1/memory/2100-42-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-44-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-57-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-59-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-61-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-65-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-71-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida behavioral1/memory/2100-73-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp themida -
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WZAgent.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
WZAgent.exepid process 2100 WZAgent.exe 2100 WZAgent.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
WZAgent.exeZipExtractor.exepid process 2428 WZAgent.exe 2428 WZAgent.exe 2744 ZipExtractor.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WZAgent.exeZipExtractor.exeWZAgent.exedescription pid process Token: SeDebugPrivilege 2428 WZAgent.exe Token: SeDebugPrivilege 2744 ZipExtractor.exe Token: SeDebugPrivilege 2100 WZAgent.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
WZAgent.exeZipExtractor.exedescription pid process target process PID 2428 wrote to memory of 2744 2428 WZAgent.exe ZipExtractor.exe PID 2428 wrote to memory of 2744 2428 WZAgent.exe ZipExtractor.exe PID 2428 wrote to memory of 2744 2428 WZAgent.exe ZipExtractor.exe PID 2744 wrote to memory of 2100 2744 ZipExtractor.exe WZAgent.exe PID 2744 wrote to memory of 2100 2744 ZipExtractor.exe WZAgent.exe PID 2744 wrote to memory of 2100 2744 ZipExtractor.exe WZAgent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe"C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe" --input C:\Users\Admin\AppData\Local\Temp\WZAgent.zip --output C:\Users\Admin\AppData\Local\Temp --current-exe C:\Users\Admin\AppData\Local\Temp\WZAgent.exe --updated-exe WZAgent.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.3MB
MD52812e3412cdfde43d093addd686f7541
SHA16044220194e89f9e4054ae049708aa364f4a2557
SHA256fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff
SHA5128fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9
-
Filesize
24.1MB
MD579dec0503e6653f7fa51aac10ab8af28
SHA1a091c55d56855f852d89d4c552ed3c28c35229f3
SHA2568a3dce3d2206ef5cfcc674d7c537ecdb0fb7f3915214b0ab6a6a39aaa14aaf5e
SHA5126416ef9201c56e2bf3e87445ca042a4fcf8e6a8ad8d5b0ac012a2329d0eea9ea045b2bc6f0d7bdefc05685c3be68b0b20946d91526f75728a5b4b8b4524c8e0a
-
Filesize
99KB
MD56c8a405b8243837682378cfbefa92001
SHA121a120c6fcca8aff536cb896586131376497bc86
SHA256a76c4d20c78a6b0e563567a215e14a05525c316bf4eb92e7d11de7e24ae0b7c2
SHA51212a75d7c4f9af4209a673c994609a15f464368e24eb61e8251a3f8c32a371825809f8197ea47428a150bc0c8ca7b5278c88c63cf9c20a7e60a95f4f98eea3de7
-
Filesize
4.0MB
MD58e839b26c5efed6f41d6e854e5e97f5b
SHA15cb71374f72bf6a63ff65a6cda57ff66c3e54836
SHA2561f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011
SHA51292446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093