Analysis
-
max time kernel
146s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 23:25
Behavioral task
behavioral1
Sample
[PAID NEW] Byte Guard Source/SECURE BYTE GUI/obj/Release/Sky Protect.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
[PAID NEW] Byte Guard Source/SECURE BYTE GUI/obj/Release/Sky Protect.exe
Resource
win10v2004-20240508-en
General
-
Target
[PAID NEW] Byte Guard Source/SECURE BYTE GUI/obj/Release/Sky Protect.exe
-
Size
3.3MB
-
MD5
44b09bd91924da97610b9e181dd242f2
-
SHA1
605219be40f3ebd1507d4b7847acc824a2c24eba
-
SHA256
47bd9a82fd1774f3cfc3513ae2b42be3c73c07372240fcda63794302912085a1
-
SHA512
1992ea5ae23fc04ca61076039c1a13edf024bba703667b8127bd232f9e801d74e4172b93cce52558e52515f3a6863fc681aec3ae898c7a39298341005484fd93
-
SSDEEP
49152:+uLSkG570nS4pfVkqgy6r3askqXfd+/9AqAanTB:+0G57K5JEyUaskqXf0FPAWT
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/3044-3-0x00000000066B0000-0x00000000068C2000-memory.dmp family_agenttesla -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ipinfo.io 3 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Sky Protect.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Sky Protect.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Sky Protect.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe 3044 Sky Protect.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3044 Sky Protect.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[PAID NEW] Byte Guard Source\SECURE BYTE GUI\obj\Release\Sky Protect.exe"C:\Users\Admin\AppData\Local\Temp\[PAID NEW] Byte Guard Source\SECURE BYTE GUI\obj\Release\Sky Protect.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3044