Overview
overview
10Static
static
10Release/Guna.UI2.dll
windows10-2004-x64
1Release/Mo...il.dll
windows10-2004-x64
10Release/Mono.Nat.dll
windows10-2004-x64
1Release/Octokit.dll
windows10-2004-x64
1Release/SeroXen.exe
windows10-2004-x64
1Release/Si...UI.dll
windows10-2004-x64
1Release/Ve...ib.dll
windows10-2004-x64
1Release/client.exe
windows10-2004-x64
10Analysis
-
max time kernel
297s -
max time network
273s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2024 15:32
Behavioral task
behavioral1
Sample
Release/Guna.UI2.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
Release/Mono.Cecil.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Release/Mono.Nat.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
Release/Octokit.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Release/SeroXen.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
Release/Siticone.Desktop.UI.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral7
Sample
Release/Vestris.ResourceLib.dll
Resource
win10v2004-20240426-en
General
-
Target
Release/Mono.Cecil.dll
-
Size
277KB
-
MD5
8df4d6b5dc1629fcefcdc20210a88eac
-
SHA1
16c661757ad90eb84228aa3487db11a2eac6fe64
-
SHA256
3e4288b32006fe8499b43a7f605bb7337931847a0aa79a33217a1d6d1a6c397e
-
SHA512
874b4987865588efb806a283b0e785fd24e8b1562026edd43050e150bce6c883134f3c8ad0f8c107b0fb1b26fce6ddcc7e344a5f55c3788dac35035b13d15174
-
SSDEEP
6144:iYOMWAEq+PAEwGQ9Xivs0s4EtS1Fv8jnLKdFvkPo2:AG+PpjQSHv8jA
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4796-5-0x000001199E210000-0x000001199E406000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
SeroXen.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer SeroXen.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion SeroXen.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SeroXen.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
SeroXen.exepid process 4796 SeroXen.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
SeroXen.exedescription pid process Token: SeDebugPrivilege 1000 SeroXen.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
SeroXen.exepid process 4796 SeroXen.exe 4796 SeroXen.exe 4796 SeroXen.exe 4796 SeroXen.exe 4796 SeroXen.exe 4796 SeroXen.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
SeroXen.exepid process 4796 SeroXen.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
SeroXen.exepid process 4796 SeroXen.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Release\Mono.Cecil.dll,#11⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Users\Admin\AppData\Local\Temp\Release\SeroXen.exe"C:\Users\Admin\AppData\Local\Temp\Release\SeroXen.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Release\SeroXen.exe"C:\Users\Admin\AppData\Local\Temp\Release\SeroXen.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Release\Profiles\Default.xmlFilesize
986B
MD5878fd2a88f9e0bbf703bda0bd0b606b3
SHA1338bdbeab30c64382ae727092518c7affc87e74d
SHA2566f5dff5587f119059a35241e684555fb33c0d7921c64e24176148df0a05edafb
SHA5120f9552b8fe357070ea2a8c4ec9c17bd3b78172e0f81fe094db3f02a373bd1d59176a7a2635300d3ddab6f44e5920f9f3a43a86686c7866caab9871df45e8081d
-
C:\Users\Admin\AppData\Local\Temp\Release\Profiles\Default.xmlFilesize
573B
MD5bffc7dc598bcf4bda005c69c09e5d3de
SHA153cb4f0307f5bacdac9278a964ef58283bca3e11
SHA2567b92e3dc71bd97ea0848a7beb0597cbc7b34569a2bdb9a03e1d5dfe395a27b0d
SHA512b5c4ddafdf9e138ce0f9019d7bbe39fcea107e3fd61e68b7dd7138ce63a40738629975f6c56536ed8677e88db3c94b68d8d7aae218c89ebff707f61f58c906a3
-
C:\Users\Admin\AppData\Local\Temp\Release\Profiles\Default.xmlFilesize
986B
MD5cd066e8abf5726b690a2ca6682f741c2
SHA1947d4ccc8a42e3e836acb49cfa71ac6a05c54f1d
SHA256a673e6e873daf7564be855f721ee374247269c385cbbdf612d29f4a29c3938a6
SHA5120bb6832236eb9c761d3d203619400cc71057e37347507773caaf0bb9ed61942712813aaf0ee2dc5d96d6ef7bc6ac1ce1a715eac581c0e4b116877925d6de1739
-
C:\Users\Admin\AppData\Local\Temp\Release\settings.xmlFilesize
51B
MD58af01757cc429d1347430084913566d1
SHA1e4ec570a0b1a5c99e0613da232eeff4b42ffaa75
SHA256f1a33cd5b1c9368f73b8ff144bed026664577317df27baff774b2bd2acbd52ef
SHA5123edbca5a661d0fbdd0f8aac994b50e3f844e1d6ee6bfeadf0d8aa89fab1b7cec69b9f687a704c7a989726bb676604e2cdb75ca30441e94a05fdd4027ec9a494a
-
memory/1000-0-0x00007FF8E75C3000-0x00007FF8E75C5000-memory.dmpFilesize
8KB
-
memory/1000-1-0x000001BCFC160000-0x000001BCFC532000-memory.dmpFilesize
3.8MB
-
memory/1000-2-0x00007FF8E75C0000-0x00007FF8E8081000-memory.dmpFilesize
10.8MB
-
memory/1000-3-0x00007FF8E75C0000-0x00007FF8E8081000-memory.dmpFilesize
10.8MB
-
memory/4796-5-0x000001199E210000-0x000001199E406000-memory.dmpFilesize
2.0MB
-
memory/4796-8-0x000001199E9E0000-0x000001199E9F0000-memory.dmpFilesize
64KB