Analysis

  • max time kernel
    133s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-05-2024 14:40

General

  • Target

    Dist.exe

  • Size

    3.6MB

  • MD5

    f361f816f04927b3141122a57f2f3f82

  • SHA1

    409cf10a30f668bcd1f6becdcc9089849b3d18ac

  • SHA256

    0a13e3279eca443d8e25bcc1c7e1bc6701fc4ab4dade37a7a52995a09f33ff39

  • SHA512

    f4aee7372d58f8099e6290375d92277a8e8c118941d9c3020bcaa88c8cac6df04b97832b5b412bffe27278e636aa53fd7e9315d473892aadf94a119377dbca02

  • SSDEEP

    98304:Ok5IT4bNJFY3Oqt/h+KH4kpc+DX/0H4feb5CE:Ok5jBHYYKYODJebgE

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Dist.exe
    "C:\Users\Admin\AppData\Local\Temp\Dist.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:3092

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3092-0-0x00007FFF98773000-0x00007FFF98775000-memory.dmp
    Filesize

    8KB

  • memory/3092-1-0x0000020F497F0000-0x0000020F49B84000-memory.dmp
    Filesize

    3.6MB

  • memory/3092-2-0x0000020F64360000-0x0000020F64574000-memory.dmp
    Filesize

    2.1MB

  • memory/3092-3-0x00007FFF98770000-0x00007FFF99231000-memory.dmp
    Filesize

    10.8MB

  • memory/3092-4-0x0000020F64570000-0x0000020F64976000-memory.dmp
    Filesize

    4.0MB

  • memory/3092-5-0x00007FFF98770000-0x00007FFF99231000-memory.dmp
    Filesize

    10.8MB

  • memory/3092-6-0x00007FFF98770000-0x00007FFF99231000-memory.dmp
    Filesize

    10.8MB

  • memory/3092-7-0x0000020F64980000-0x0000020F650D7000-memory.dmp
    Filesize

    7.3MB

  • memory/3092-8-0x00007FFF98770000-0x00007FFF99231000-memory.dmp
    Filesize

    10.8MB