Overview
overview
10Static
static
3VISUAL FRE...D).ttf
windows7-x64
3VISUAL FRE...D).ttf
windows10-2004-x64
7VISUAL FRE...D).ttf
windows7-x64
3VISUAL FRE...D).ttf
windows10-2004-x64
7VISUAL FRE...D).ttf
windows7-x64
3VISUAL FRE...D).ttf
windows10-2004-x64
7VISUAL FRE...SO.exe
windows7-x64
7VISUAL FRE...SO.exe
windows10-2004-x64
7VISUAL FRE...ST.exe
windows7-x64
7VISUAL FRE...ST.exe
windows10-2004-x64
7VISUAL FRE...ee.exe
windows7-x64
10VISUAL FRE...ee.exe
windows10-2004-x64
10Analysis
-
max time kernel
124s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
08/06/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/INSTALL ME (REQUIRED).ttf
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/INSTALL ME (REQUIRED).ttf
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/INSTALL ME ASWELL! (REQUIRED).ttf
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/INSTALL ME ASWELL! (REQUIRED).ttf
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/INSTALL ME TO (REQUIRED).ttf
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/INSTALL ME TO (REQUIRED).ttf
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/RUN ME ALSO.exe
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/RUN ME ALSO.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/RUN ME FIRST.exe
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
VISUAL FREE/VISUAL FREE/INSTALL THESE FIRST!/RUN ME FIRST.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
VISUAL FREE/VISUAL FREE/Visual Free.exe
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
VISUAL FREE/VISUAL FREE/Visual Free.exe
Resource
win10v2004-20240508-en
General
-
Target
VISUAL FREE/VISUAL FREE/Visual Free.exe
-
Size
1.5MB
-
MD5
3a13abf4262c67c1b8cc4409f3c619ec
-
SHA1
154a2c04005d0835317a3b525a3ad40dad7dc772
-
SHA256
4c467b19727b3a922e915c27431f15a0d39a33a9e7ab411d311ed521979385dd
-
SHA512
9edeb7584978f3c49719eeac93bf00ffefd9764261163d2031f5623839c5543537f40cc44c70c2611b715ac2ab6723b74bb4f1fb256ec33faaec8e5f88799263
-
SSDEEP
24576:77o7X+gn2G9LJVJGnnA9FNQ3RGWZTCno8D+cM19s2XXCCLS/2ECRURusE6x:7Kr2aVJCAOGWZTkXMU2LaGRD
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral12/memory/3208-7-0x0000000006F20000-0x0000000007134000-memory.dmp family_agenttesla -
Program crash 2 IoCs
pid pid_target Process procid_target 4040 3208 WerFault.exe 88 4920 3208 WerFault.exe 88 -
Delays execution with timeout.exe 1 IoCs
pid Process 2436 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Visual Free.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Visual Free.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Visual Free.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3208 Visual Free.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3208 Visual Free.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3208 wrote to memory of 3444 3208 Visual Free.exe 92 PID 3208 wrote to memory of 3444 3208 Visual Free.exe 92 PID 3208 wrote to memory of 3444 3208 Visual Free.exe 92 PID 3444 wrote to memory of 2436 3444 cmd.exe 94 PID 3444 wrote to memory of 2436 3444 cmd.exe 94 PID 3444 wrote to memory of 2436 3444 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\VISUAL FREE\VISUAL FREE\Visual Free.exe"C:\Users\Admin\AppData\Local\Temp\VISUAL FREE\VISUAL FREE\Visual Free.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c >NUL timeout /t 2 && exit2⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\timeout.exetimeout /t 23⤵
- Delays execution with timeout.exe
PID:2436
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 14642⤵
- Program crash
PID:4040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 11562⤵
- Program crash
PID:4920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 372 -p 3208 -ip 32081⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 3208 -ip 32081⤵PID:752
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3760,i,13035806169561352434,1332896185314862791,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:81⤵PID:208