Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
AudioChanger.exe
Resource
win7-20240508-en
windows7-x64
4 signatures
150 seconds
General
-
Target
AudioChanger.exe
-
Size
1.3MB
-
MD5
43b0b033d7458249dd76642d996230ba
-
SHA1
9760d72a56d7e70ea4b1e704073bdc528926ed34
-
SHA256
bc51460c53989fff76b30039fffe6dfba7b68b44d7a40a0c6e94590141f8814b
-
SHA512
c56fb332dcc96e5fa6aff706c9081981226b7f82d2e18473a72382e69eadc379ea58e0d6081f091ecdee9d4dee2c75ca60b435964e7bdb43fbdcd881f81ee475
-
SSDEEP
24576:WEtfWjg4xVGitOcfYmzwGXvlBeDWH89eosLliGnIuN1PyFoBkkAe/ALjX:9fWjgYEitVwmzwGXvlBNH89kLZnTKan
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/328-2-0x000000001C590000-0x000000001C7A4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
AudioChanger.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS AudioChanger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer AudioChanger.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion AudioChanger.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
AudioChanger.exedescription pid process target process PID 328 wrote to memory of 492 328 AudioChanger.exe WerFault.exe PID 328 wrote to memory of 492 328 AudioChanger.exe WerFault.exe PID 328 wrote to memory of 492 328 AudioChanger.exe WerFault.exe