Analysis
-
max time kernel
14s -
max time network
16s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 17:13
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Oxycontin.exe
Resource
win10v2004-20240508-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Oxycontin.exe
-
Size
9.3MB
-
MD5
19ac650b2f6a3d6a210bc1a0bed4d3e7
-
SHA1
db3d2278e300ba3ffcd7572915ae47ef4783372c
-
SHA256
24b76df7abc8f59e9936af61ba8b9b10bd34c609c28133ebfddc25cf1968a95f
-
SHA512
f35ae9ad3e9d0702acb7aefb08f88b18372987a442fbfc0920a377bead4a1a1ef379936a9b0751da5711a266bb3d75bc5b57214d726f4508232e68af873daa7b
-
SSDEEP
196608:0915JSpQgHae6TqZlBay2UjzkSIDi6Uck:09gUe6Y7YUnkSZE
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4564-6-0x00000000064D0000-0x00000000066E2000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
Oxycontin.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Oxycontin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Oxycontin.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Oxycontin.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Oxycontin.exedescription pid process Token: SeDebugPrivilege 4564 Oxycontin.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4564-0-0x000000007492E000-0x000000007492F000-memory.dmpFilesize
4KB
-
memory/4564-1-0x0000000000D60000-0x00000000016AA000-memory.dmpFilesize
9.3MB
-
memory/4564-2-0x00000000067C0000-0x0000000006D64000-memory.dmpFilesize
5.6MB
-
memory/4564-3-0x00000000060A0000-0x0000000006132000-memory.dmpFilesize
584KB
-
memory/4564-4-0x0000000074920000-0x00000000750D0000-memory.dmpFilesize
7.7MB
-
memory/4564-5-0x0000000006150000-0x000000000615A000-memory.dmpFilesize
40KB
-
memory/4564-6-0x00000000064D0000-0x00000000066E2000-memory.dmpFilesize
2.1MB
-
memory/4564-7-0x0000000007E30000-0x0000000007E42000-memory.dmpFilesize
72KB
-
memory/4564-8-0x0000000007800000-0x00000000078B2000-memory.dmpFilesize
712KB
-
memory/4564-9-0x0000000007930000-0x0000000007952000-memory.dmpFilesize
136KB
-
memory/4564-10-0x0000000074920000-0x00000000750D0000-memory.dmpFilesize
7.7MB
-
memory/4564-11-0x0000000009A30000-0x0000000009D84000-memory.dmpFilesize
3.3MB
-
memory/4564-13-0x00000000079D0000-0x0000000007A0C000-memory.dmpFilesize
240KB