Analysis
-
max time kernel
26s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
02-07-2024 23:25
Behavioral task
behavioral1
Sample
[PAID NEW] Byte Guard Source/SECURE BYTE GUI/obj/Release/Sky Protect.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
[PAID NEW] Byte Guard Source/SECURE BYTE GUI/obj/Release/Sky Protect.exe
Resource
win10v2004-20240508-en
General
-
Target
[PAID NEW] Byte Guard Source/SECURE BYTE GUI/obj/Release/Sky Protect.exe
-
Size
3.3MB
-
MD5
44b09bd91924da97610b9e181dd242f2
-
SHA1
605219be40f3ebd1507d4b7847acc824a2c24eba
-
SHA256
47bd9a82fd1774f3cfc3513ae2b42be3c73c07372240fcda63794302912085a1
-
SHA512
1992ea5ae23fc04ca61076039c1a13edf024bba703667b8127bd232f9e801d74e4172b93cce52558e52515f3a6863fc681aec3ae898c7a39298341005484fd93
-
SSDEEP
49152:+uLSkG570nS4pfVkqgy6r3askqXfd+/9AqAanTB:+0G57K5JEyUaskqXf0FPAWT
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/312-14-0x000000000A030000-0x000000000A242000-memory.dmp family_agenttesla -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 15 ipinfo.io 16 ipinfo.io -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Sky Protect.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Sky Protect.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Sky Protect.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe 312 Sky Protect.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 312 Sky Protect.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 312 Sky Protect.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\[PAID NEW] Byte Guard Source\SECURE BYTE GUI\obj\Release\Sky Protect.exe"C:\Users\Admin\AppData\Local\Temp\[PAID NEW] Byte Guard Source\SECURE BYTE GUI\obj\Release\Sky Protect.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:312