Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-05-2024 15:14
General
-
Target
WZAgent.exe
-
Size
24.3MB
-
MD5
2812e3412cdfde43d093addd686f7541
-
SHA1
6044220194e89f9e4054ae049708aa364f4a2557
-
SHA256
fc7eb157162927439876c4562b5384cc68db185bfcf91335c8c7edc1d2dcf5ff
-
SHA512
8fa3035a2959854971539d0b62594c152c25417a6c55581eb91510730aed661e97698685a3566f7ade939cb1c55429f6b73fd9159f04de6e78571e55de2148a9
-
SSDEEP
393216:T/2gRyBpa4UEQ7mMzVR0/p/I3Eqg8OqnYTOWxhXNPQfLtCwzIuDSMivX:TupzUEQ7mkVR0RI/OqnYtdPY9SxvX
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4100-24-0x0000000020E70000-0x0000000021062000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
WZAgent.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZAgent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZAgent.exe -
Loads dropped DLL 1 IoCs
Processes:
WZAgent.exepid process 4100 WZAgent.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/4100-6-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net behavioral1/memory/4100-7-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net behavioral1/memory/4100-34-0x0000000000400000-0x00000000023C0000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/4100-6-0x0000000000400000-0x00000000023C0000-memory.dmp themida behavioral1/memory/4100-7-0x0000000000400000-0x00000000023C0000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\67086c7f-8595-4935-b455-2a765bd8e033\AgileDotNetRT64.dll themida behavioral1/memory/4100-15-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-17-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-29-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-33-0x00007FF9FB170000-0x00007FF9FBC99000-memory.dmp themida behavioral1/memory/4100-34-0x0000000000400000-0x00000000023C0000-memory.dmp themida -
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WZAgent.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
WZAgent.exepid process 4100 WZAgent.exe 4100 WZAgent.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WZAgent.exedescription pid process Token: SeDebugPrivilege 4100 WZAgent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:4100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD58e839b26c5efed6f41d6e854e5e97f5b
SHA15cb71374f72bf6a63ff65a6cda57ff66c3e54836
SHA2561f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011
SHA51292446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093