Analysis

  • max time kernel
    14s
  • max time network
    16s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    21-05-2024 15:14

General

  • Target

    WZAgent.exe

  • Size

    24.3MB

  • MD5

    2812e3412cdfde43d093addd686f7541

  • SHA1

    6044220194e89f9e4054ae049708aa364f4a2557

  • SHA256

    fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff

  • SHA512

    8fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9

  • SSDEEP

    393216:T/2gRyBpa4UEQ7mMzVR0/p/I3Eqg8OqnYTOWxhXNPQfLtCwzIuDSMivX:TupzUEQ7mkVR0RI/OqnYtdPY9SxvX

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 3 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Themida packer 8 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\WZAgent.exe
    "C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of AdjustPrivilegeToken
    PID:4100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\67086c7f-8595-4935-b455-2a765bd8e033\AgileDotNetRT64.dll

    Filesize

    4.0MB

    MD5

    8e839b26c5efed6f41d6e854e5e97f5b

    SHA1

    5cb71374f72bf6a63ff65a6cda57ff66c3e54836

    SHA256

    1f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011

    SHA512

    92446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093

  • memory/4100-17-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp

    Filesize

    11.2MB

  • memory/4100-5-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmp

    Filesize

    3.5MB

  • memory/4100-23-0x000000001EC50000-0x000000001ECC6000-memory.dmp

    Filesize

    472KB

  • memory/4100-6-0x0000000000400000-0x00000000023C0000-memory.dmp

    Filesize

    31.8MB

  • memory/4100-7-0x0000000000400000-0x00000000023C0000-memory.dmp

    Filesize

    31.8MB

  • memory/4100-8-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmp

    Filesize

    3.5MB

  • memory/4100-1-0x00007FFA1E939000-0x00007FFA1E93A000-memory.dmp

    Filesize

    4KB

  • memory/4100-15-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp

    Filesize

    11.2MB

  • memory/4100-22-0x0000000021B30000-0x00000000227B6000-memory.dmp

    Filesize

    12.5MB

  • memory/4100-0-0x0000000000400000-0x00000000023C0000-memory.dmp

    Filesize

    31.8MB

  • memory/4100-35-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmp

    Filesize

    3.5MB

  • memory/4100-2-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmp

    Filesize

    3.5MB

  • memory/4100-18-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmp

    Filesize

    3.5MB

  • memory/4100-24-0x0000000020E70000-0x0000000021062000-memory.dmp

    Filesize

    1.9MB

  • memory/4100-25-0x00007FFA1E8E0000-0x00007FFA1EC54000-memory.dmp

    Filesize

    3.5MB

  • memory/4100-26-0x0000000000400000-0x00000000023C0000-memory.dmp

    Filesize

    31.8MB

  • memory/4100-28-0x0000000004E10000-0x00000000058D2000-memory.dmp

    Filesize

    10.8MB

  • memory/4100-29-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp

    Filesize

    11.2MB

  • memory/4100-32-0x0000000004E10000-0x00000000058D2000-memory.dmp

    Filesize

    10.8MB

  • memory/4100-33-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp

    Filesize

    11.2MB

  • memory/4100-34-0x0000000000400000-0x00000000023C0000-memory.dmp

    Filesize

    31.8MB

  • memory/4100-21-0x00007FF9FDBD0000-0x00007FF9FDD1F000-memory.dmp

    Filesize

    1.3MB