Analysis
-
max time kernel
141s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
29-06-2024 16:14
Behavioral task
behavioral1
Sample
PasswordGenerator.exe
Resource
win7-20240611-en
windows7-x64
8 signatures
150 seconds
General
-
Target
PasswordGenerator.exe
-
Size
6.8MB
-
MD5
24d6a1747fd94a5ff8208eb36a90c82c
-
SHA1
b997426ba296d7df9979b63d811208d32bde46df
-
SHA256
33eeb2e0f57adc35dd5ca9100e6020ee63518b5e8f22517d997ad17593cbb6c4
-
SHA512
7c458d8de277f1554b6d0c6d78e43d4fef645dba7a4b6fc3893507a85a89ff7cc508f8719ae326eedec3f5a674ce7f781bb60206b49439cbb7d45408a4f95918
-
SSDEEP
196608:RgNV+mtzsDwx/4eZ2+WcV0SwdTr+Dx/P5Qx9ZiypE:YVdsD6/4eZ2fQCdG9Z09ZiypE
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2820-33-0x0000000005E00000-0x0000000005FF6000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ PasswordGenerator.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PasswordGenerator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PasswordGenerator.exe -
resource yara_rule behavioral1/memory/2820-31-0x0000000000CD0000-0x0000000001A1C000-memory.dmp themida behavioral1/memory/2820-32-0x0000000000CD0000-0x0000000001A1C000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordGenerator.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2820 PasswordGenerator.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer PasswordGenerator.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion PasswordGenerator.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS PasswordGenerator.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PasswordGenerator.exe"C:\Users\Admin\AppData\Local\Temp\PasswordGenerator.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
PID:2820