Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
22/09/2024, 09:23 UTC
240922-lcmh6ssclm 921/09/2024, 08:10 UTC
240921-j2tbxasfjj 921/09/2024, 07:38 UTC
240921-jggsda1gjl 928/07/2024, 17:11 UTC
240728-vp9c5syajh 1018/06/2024, 14:08 UTC
240618-rfnhjaxanf 10Analysis
-
max time kernel
41s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
18/06/2024, 14:08 UTC
General
-
Target
WZAgent.exe
-
Size
26.2MB
-
MD5
4cf978f2749291d8d9a722cf8bd9d9ea
-
SHA1
2580a9be8bc6994987cc4951a4690efd7077ea92
-
SHA256
ea8779bb436427af92289d75ee7510e1784bf6772729091abcc350cdf773058c
-
SHA512
d1ba2ea6a06cf5241bd26319b7bd2da7cb3ca0453496703fa66413cc56edf9893414a970dfb67451cfb85ef735305986958ba852287b3dc63b7cf28ab351d61d
-
SSDEEP
786432:Ov1EWULlsocwpd3XHEquH6rdEePFG/7vG43EY6:Ov1EWusor8j6r714
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/632-26-0x0000000020860000-0x0000000020A52000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZAgent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZAgent.exe -
Loads dropped DLL 1 IoCs
pid Process 632 WZAgent.exe -
Obfuscated with Agile.Net obfuscator 3 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/632-6-0x0000000000400000-0x0000000002606000-memory.dmp agile_net behavioral1/memory/632-7-0x0000000000400000-0x0000000002606000-memory.dmp agile_net behavioral1/memory/632-37-0x0000000000400000-0x0000000002606000-memory.dmp agile_net -
resource yara_rule behavioral1/memory/632-6-0x0000000000400000-0x0000000002606000-memory.dmp themida behavioral1/memory/632-7-0x0000000000400000-0x0000000002606000-memory.dmp themida behavioral1/files/0x0005000000022ac6-12.dat themida behavioral1/memory/632-15-0x00007FFEE5870000-0x00007FFEE6399000-memory.dmp themida behavioral1/memory/632-17-0x00007FFEE5870000-0x00007FFEE6399000-memory.dmp themida behavioral1/memory/632-20-0x00007FFEE5870000-0x00007FFEE6399000-memory.dmp themida behavioral1/memory/632-29-0x00007FFEE5870000-0x00007FFEE6399000-memory.dmp themida behavioral1/memory/632-35-0x00007FFEE5870000-0x00007FFEE6399000-memory.dmp themida behavioral1/memory/632-37-0x0000000000400000-0x0000000002606000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WZAgent.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 632 WZAgent.exe 632 WZAgent.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 632 WZAgent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
PID:632
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3724
Network
-
Remote address:8.8.8.8:53Requestplayagent.ioIN A
-
Remote address:8.8.8.8:53Requestplayagent.ioIN A
-
Remote address:8.8.8.8:53Requestplayagent.ioIN A
-
Remote address:8.8.8.8:53Requestplayagent.ioIN A
-
Remote address:8.8.8.8:53Requestplayagent.ioIN A
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.0MB
MD58e839b26c5efed6f41d6e854e5e97f5b
SHA15cb71374f72bf6a63ff65a6cda57ff66c3e54836
SHA2561f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011
SHA51292446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093