Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
OsussistInstaller.exe
Resource
win7-20240708-en
General
-
Target
OsussistInstaller.exe
-
Size
1.6MB
-
MD5
192846aab90044b00521f2ba4e99ee03
-
SHA1
14b8bb92ce9d4046c3b66dc252cfb15fd7070576
-
SHA256
a914feb849114b198f068f0309172defadabc8aa5042dadc41ef7b095771f7d5
-
SHA512
119ee834aa21e3c4460b0830d09ffbb1ee4cd1df1692d5324f66dfad5e327d953d82f93ae70b36a2286c6024c012a1ed8e0ebafabc9b31ad696ee7ffa0ee2a08
-
SSDEEP
24576:jTQcPTAcySiDNpfVkqgfPyU8/oa8reuaDQkqjVnlqud+/2P+AH:H70nS4pfVkqgy6r3askqXfd+/9A
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/2348-12-0x00000000067A0000-0x00000000069B2000-memory.dmp family_agenttesla -
Downloads MZ/PE file
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Fonts\comfortaa.ttf OsussistInstaller.exe File opened for modification C:\Windows\Fonts\comfortaa.ttf OsussistInstaller.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OsussistInstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS OsussistInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer OsussistInstaller.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion OsussistInstaller.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2348 OsussistInstaller.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2348 wrote to memory of 212 2348 OsussistInstaller.exe 87 PID 2348 wrote to memory of 212 2348 OsussistInstaller.exe 87 PID 2348 wrote to memory of 212 2348 OsussistInstaller.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\OsussistInstaller.exe"C:\Users\Admin\AppData\Local\Temp\OsussistInstaller.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\reg.exe"reg" add "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Fonts" /v "comfortaa (TrueType)" /t REG_SZ /d "comfortaa.ttf" /f2⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198KB
MD5b14da82fd326fb23ada0b4df443cda25
SHA189d13684a897ae7ca4dae157eb05000db6b3e6c8
SHA256b9281be276c9f683947bb52f44f30d27dccc94e578ecec5e33c0883f01c57063
SHA5125e9d2fc0376304fb6de2458dafa3e2f9703223a6d6e0bb78c2cad3b6e1f169a9ad5af2f39a47a15c3262608b5ba46bd048df51e189f79af97179158922dfc9a4