Analysis

  • max time kernel
    141s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    21-05-2024 22:21

General

  • Target

    WZAgent.exe

  • Size

    9.4MB

  • MD5

    86137e9ed8313472f22f6e523d8ad219

  • SHA1

    49e66323a9ad23e49569edfb0f4ca2d3c67ef61b

  • SHA256

    e25599248cbab0ee17db46769aefac345098d9a066192f89c0072a38c726f50a

  • SHA512

    f06d574d3a5040303ef9a246a73163675169f8e5086835279a376ab14442f3f38afe70ea31fc68357845e28e3872e94e9b8f67694a3b6fc288d5b85d7d2975d6

  • SSDEEP

    196608:/ntsxE5JupJ6XmXIY3AmEXxeA32ngfgZ5Kv+yWGqL+aewN8L:/nts+Upam4OAmEXn4Z5C+RLN

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 12 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WZAgent.exe
    "C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe
      "C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe" --input C:\Users\Admin\AppData\Local\Temp\WZAgent.zip --output C:\Users\Admin\AppData\Local\Temp --current-exe C:\Users\Admin\AppData\Local\Temp\WZAgent.exe --updated-exe WZAgent.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\WZAgent.exe
        "C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"
        3⤵
        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
        • Checks BIOS information in registry
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of AdjustPrivilegeToken
        PID:2100

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Virtualization/Sandbox Evasion

1
T1497

Discovery

Query Registry

2
T1012

Virtualization/Sandbox Evasion

1
T1497

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WZAgent.exe
    Filesize

    24.3MB

    MD5

    2812e3412cdfde43d093addd686f7541

    SHA1

    6044220194e89f9e4054ae049708aa364f4a2557

    SHA256

    fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff

    SHA512

    8fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9

  • C:\Users\Admin\AppData\Local\Temp\WZAgent.zip
    Filesize

    24.1MB

    MD5

    79dec0503e6653f7fa51aac10ab8af28

    SHA1

    a091c55d56855f852d89d4c552ed3c28c35229f3

    SHA256

    8a3dce3d2206ef5cfcc674d7c537ecdb0fb7f3915214b0ab6a6a39aaa14aaf5e

    SHA512

    6416ef9201c56e2bf3e87445ca042a4fcf8e6a8ad8d5b0ac012a2329d0eea9ea045b2bc6f0d7bdefc05685c3be68b0b20946d91526f75728a5b4b8b4524c8e0a

  • C:\Users\Admin\AppData\Local\Temp\ZipExtractor.exe
    Filesize

    99KB

    MD5

    6c8a405b8243837682378cfbefa92001

    SHA1

    21a120c6fcca8aff536cb896586131376497bc86

    SHA256

    a76c4d20c78a6b0e563567a215e14a05525c316bf4eb92e7d11de7e24ae0b7c2

    SHA512

    12a75d7c4f9af4209a673c994609a15f464368e24eb61e8251a3f8c32a371825809f8197ea47428a150bc0c8ca7b5278c88c63cf9c20a7e60a95f4f98eea3de7

  • \Users\Admin\AppData\Local\Temp\67086c7f-8595-4935-b455-2a765bd8e033\AgileDotNetRT64.dll
    Filesize

    4.0MB

    MD5

    8e839b26c5efed6f41d6e854e5e97f5b

    SHA1

    5cb71374f72bf6a63ff65a6cda57ff66c3e54836

    SHA256

    1f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011

    SHA512

    92446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093

  • memory/2100-55-0x000000001FC90000-0x0000000020916000-memory.dmp
    Filesize

    12.5MB

  • memory/2100-44-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-59-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-57-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-34-0x0000000000400000-0x00000000023C0000-memory.dmp
    Filesize

    31.8MB

  • memory/2100-61-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-54-0x000007FEF5ED0000-0x000007FEF5FFC000-memory.dmp
    Filesize

    1.2MB

  • memory/2100-60-0x0000000000400000-0x00000000023C0000-memory.dmp
    Filesize

    31.8MB

  • memory/2100-42-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-65-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-71-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-73-0x000007FEEDFC0000-0x000007FEEEAE9000-memory.dmp
    Filesize

    11.2MB

  • memory/2100-35-0x0000000000400000-0x00000000023C0000-memory.dmp
    Filesize

    31.8MB

  • memory/2100-30-0x0000000000400000-0x00000000023C0000-memory.dmp
    Filesize

    31.8MB

  • memory/2428-8-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-5-0x0000000000DD0000-0x0000000000E46000-memory.dmp
    Filesize

    472KB

  • memory/2428-1-0x0000000000FC0000-0x0000000001922000-memory.dmp
    Filesize

    9.4MB

  • memory/2428-19-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-2-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-3-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-4-0x000000001D630000-0x000000001E0B6000-memory.dmp
    Filesize

    10.5MB

  • memory/2428-0-0x000007FEF5713000-0x000007FEF5714000-memory.dmp
    Filesize

    4KB

  • memory/2428-7-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2428-6-0x000000001E0C0000-0x000000001E2B2000-memory.dmp
    Filesize

    1.9MB

  • memory/2744-31-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2744-16-0x00000000008B0000-0x00000000008CE000-memory.dmp
    Filesize

    120KB

  • memory/2744-17-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2744-18-0x000007FEF5710000-0x000007FEF60FC000-memory.dmp
    Filesize

    9.9MB

  • memory/2744-28-0x000000001D080000-0x000000001F040000-memory.dmp
    Filesize

    31.8MB