Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 15:14
General
-
Target
WZAgent.exe
-
Size
24.3MB
-
MD5
2812e3412cdfde43d093addd686f7541
-
SHA1
6044220194e89f9e4054ae049708aa364f4a2557
-
SHA256
fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff
-
SHA512
8fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9
-
SSDEEP
393216:T/2gRyBpa4UEQ7mMzVR0/p/I3Eqg8OqnYTOWxhXNPQfLtCwzIuDSMivX:TupzUEQ7mkVR0RI/OqnYtdPY9SxvX
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4100-24-0x0000000020E70000-0x0000000021062000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
WZAgent.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZAgent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZAgent.exe -
Loads dropped DLL 1 IoCs
Processes:
WZAgent.exepid process 4100 WZAgent.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/4100-6-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net behavioral1/memory/4100-7-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net behavioral1/memory/4100-34-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/4100-6-0x0000000000400000-0x00000000023C0000-memory.dmp themida behavioral1/memory/4100-7-0x0000000000400000-0x00000000023C0000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\67086c7f-8595-4935-b455-2a765bd8e033\AgileDotNetRT64.dll themida behavioral1/memory/4100-15-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-17-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-29-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-33-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-34-0x0000000000400000-0x00000000023C0000-memory.dmp themida -
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WZAgent.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
WZAgent.exepid process 4100 WZAgent.exe 4100 WZAgent.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WZAgent.exedescription pid process Token: SeDebugPrivilege 4100 WZAgent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\67086c7f-8595-4935-b455-2a765bd8e033\AgileDotNetRT64.dllFilesize
4.0MB
MD58e839b26c5efed6f41d6e854e5e97f5b
SHA15cb71374f72bf6a63ff65a6cda57ff66c3e54836
SHA2561f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011
SHA51292446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093
-
memory/4100-17-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmpFilesize
11.2MB
-
memory/4100-5-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmpFilesize
3.5MB
-
memory/4100-23-0x000000001EC50000-0x000000001ECC6000-memory.dmpFilesize
472KB
-
memory/4100-6-0x0000000000400000-0x00000000023C0000-memory.dmpFilesize
31.8MB
-
memory/4100-7-0x0000000000400000-0x00000000023C0000-memory.dmpFilesize
31.8MB
-
memory/4100-8-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmpFilesize
3.5MB
-
memory/4100-1-0x00007FFA1E939000-0x00007FFA1E93A000-memory.dmpFilesize
4KB
-
memory/4100-15-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmpFilesize
11.2MB
-
memory/4100-22-0x0000000021B30000-0x00000000227B6000-memory.dmpFilesize
12.5MB
-
memory/4100-0-0x0000000000400000-0x00000000023C0000-memory.dmpFilesize
31.8MB
-
memory/4100-35-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmpFilesize
3.5MB
-
memory/4100-2-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmpFilesize
3.5MB
-
memory/4100-18-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmpFilesize
3.5MB
-
memory/4100-24-0x0000000020E70000-0x0000000021062000-memory.dmpFilesize
1.9MB
-
memory/4100-25-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmpFilesize
3.5MB
-
memory/4100-26-0x0000000000400000-0x00000000023C0000-memory.dmpFilesize
31.8MB
-
memory/4100-28-0x0000000004E10000-0x00000000058D2000-memory.dmpFilesize
10.8MB
-
memory/4100-29-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmpFilesize
11.2MB
-
memory/4100-32-0x0000000004E10000-0x00000000058D2000-memory.dmpFilesize
10.8MB
-
memory/4100-33-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmpFilesize
11.2MB
-
memory/4100-34-0x0000000000400000-0x00000000023C0000-memory.dmpFilesize
31.8MB
-
memory/4100-21-0x00007FF9FDBD0000-0x00007FF9FDD1F000-memory.dmpFilesize
1.3MB