Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-06-2024 15:38

General

  • Target

    https://mega.nz/folder/cLFiXCID#Qg9LTfZvl7GbBgb_-5xjPw

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://mega.nz/folder/cLFiXCID#Qg9LTfZvl7GbBgb_-5xjPw
    1⤵
      PID:4796
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=4916 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:1
      1⤵
        PID:2640
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=4920 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:1
        1⤵
          PID:5080
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4384 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:3572
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=3780 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
            1⤵
              PID:660
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=5620 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:1
              1⤵
                PID:3192
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --no-appcompat-clear --mojo-platform-channel-handle=5944 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
                1⤵
                  PID:1928
                • C:\Windows\system32\AUDIODG.EXE
                  C:\Windows\system32\AUDIODG.EXE 0x4d4 0x4e0
                  1⤵
                    PID:4680
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=3688 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
                    1⤵
                      PID:2244
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --no-appcompat-clear --mojo-platform-channel-handle=6488 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
                      1⤵
                        PID:4036
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --mojo-platform-channel-handle=6548 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:1
                        1⤵
                          PID:2096
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.FileUtilService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6824 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
                          1⤵
                            PID:4064
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --mojo-platform-channel-handle=6860 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:8
                            1⤵
                              PID:868
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:1668
                              • C:\Users\Admin\Desktop\XWorm V5.3 Optimized Bin\XWorm V5.2.exe
                                "C:\Users\Admin\Desktop\XWorm V5.3 Optimized Bin\XWorm V5.2.exe"
                                1⤵
                                • Loads dropped DLL
                                • Enumerates system info in registry
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1388
                              • C:\Users\Admin\Desktop\XWorm V5.3 Optimized Bin\XWormLoader 5.2 x64.exe
                                "C:\Users\Admin\Desktop\XWorm V5.3 Optimized Bin\XWormLoader 5.2 x64.exe"
                                1⤵
                                • Loads dropped DLL
                                • Enumerates system info in registry
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4496
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/XCoderTools
                                  2⤵
                                    PID:1664
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=28 --mojo-platform-channel-handle=5632 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:1
                                  1⤵
                                    PID:1236
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=29 --mojo-platform-channel-handle=5772 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:1
                                    1⤵
                                      PID:2088

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\RFZzY\RFZzY.dll

                                      Filesize

                                      112KB

                                      MD5

                                      2f1a50031dcf5c87d92e8b2491fdcea6

                                      SHA1

                                      71e2aaa2d1bb7dbe32a00e1d01d744830ecce08f

                                      SHA256

                                      47578a37901c82f66e4dba47acd5c3cab6d09c9911d16f5ad0413275342147ed

                                      SHA512

                                      1c66dbe1320c1a84023bdf77686a2a7ab79a3e86ba5a4ea2cda9a37f8a916137d5cfec30b28ceae181355f6f279270465ef63ae90b7e8dcd4c1a8198a7fd36a8

                                    • memory/1388-0-0x00007FFDB81F3000-0x00007FFDB81F5000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1388-1-0x0000021B9B340000-0x0000021B9C11E000-memory.dmp

                                      Filesize

                                      13.9MB

                                    • memory/1388-9-0x00007FFDB81F0000-0x00007FFDB8CB1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/1388-28-0x00007FFDB81F0000-0x00007FFDB8CB1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/1388-27-0x00007FFDB81F3000-0x00007FFDB81F5000-memory.dmp

                                      Filesize

                                      8KB

                                    • memory/1388-19-0x0000021BB8420000-0x0000021BB8614000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/1388-17-0x0000021BB7540000-0x0000021BB812C000-memory.dmp

                                      Filesize

                                      11.9MB

                                    • memory/4496-16-0x0000023C708E0000-0x0000023C70936000-memory.dmp

                                      Filesize

                                      344KB

                                    • memory/4496-22-0x0000023C70940000-0x0000023C7097C000-memory.dmp

                                      Filesize

                                      240KB

                                    • memory/4496-14-0x0000023C6FF90000-0x0000023C6FF96000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/4496-13-0x0000023C6FFA0000-0x0000023C6FFC8000-memory.dmp

                                      Filesize

                                      160KB

                                    • memory/4496-18-0x00007FFDB81F0000-0x00007FFDB8CB1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4496-12-0x0000023C6FFE0000-0x0000023C70022000-memory.dmp

                                      Filesize

                                      264KB

                                    • memory/4496-20-0x0000023C6E650000-0x0000023C6E656000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/4496-15-0x0000023C70880000-0x0000023C708DE000-memory.dmp

                                      Filesize

                                      376KB

                                    • memory/4496-21-0x0000023C6FF70000-0x0000023C6FF76000-memory.dmp

                                      Filesize

                                      24KB

                                    • memory/4496-23-0x0000023C70150000-0x0000023C7016A000-memory.dmp

                                      Filesize

                                      104KB

                                    • memory/4496-24-0x0000023C71760000-0x0000023C7253E000-memory.dmp

                                      Filesize

                                      13.9MB

                                    • memory/4496-11-0x00007FFDB81F0000-0x00007FFDB8CB1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4496-10-0x0000000000A50000-0x0000000000A70000-memory.dmp

                                      Filesize

                                      128KB

                                    • memory/4496-29-0x00007FFDB81F0000-0x00007FFDB8CB1000-memory.dmp

                                      Filesize

                                      10.8MB

                                    • memory/4496-30-0x00007FFDB81F0000-0x00007FFDB8CB1000-memory.dmp

                                      Filesize

                                      10.8MB