Analysis

  • max time kernel
    86s
  • max time network
    79s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-de
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-delocale:de-deos:windows10-2004-x64systemwindows
  • submitted
    03-09-2024 10:43

General

  • Target

    Chaser Temp CRACKED.zip

  • Size

    4.5MB

  • MD5

    110ef86686ba4be41314e43de2462cd8

  • SHA1

    3b9e33319f8693d32ac3fe1a0a75b0afb478de1a

  • SHA256

    c037429f30412b9308880840a0a5ee836ddd685e1af97c67853fed62308516c7

  • SHA512

    e5d94bbb8fe50f03391bf37c609d015d4653f1c055c4d15cd93a7ed167271afd3a08530be73d6d62198970e49c2909bff9345ffeff122f313494fcf5f56921ee

  • SSDEEP

    98304:D8JQ9csmb+XU5lemYidFoJjNKdSkGa72mqE2mTgbNJNLzxQcgwH382I/nnD:D8JQWFb5ThvouAbBDnDgi82IfD

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies system certificate store 2 TTPs 34 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\Chaser Temp CRACKED.zip"
    1⤵
      PID:5224
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:1100
      • C:\Windows\system32\NOTEPAD.EXE
        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\Chaser Temp CRACKED\Instructions.txt
        1⤵
        • Suspicious use of FindShellTrayWindow
        PID:5044
      • C:\Windows\system32\rundll32.exe
        "C:\Windows\system32\rundll32.exe" cryptext.dll,CryptExtOpenCER C:\Users\Admin\Documents\Chaser Temp CRACKED\certificate.crt
        1⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4764
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Windows\system32\cryptext.dll,CryptExtAddCERMachineOnlyAndHwnd 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 66408
          2⤵
          • Modifies data under HKEY_USERS
          • Modifies system certificate store
          PID:5944
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
        1⤵
          PID:4948
        • C:\Users\Admin\Documents\Chaser Temp CRACKED\bypassed.exe
          "C:\Users\Admin\Documents\Chaser Temp CRACKED\bypassed.exe"
          1⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2380
          • C:\Windows\system32\cmd.exe
            "C:\Windows\sysnative\cmd" /c "C:\Users\Admin\AppData\Local\Temp\47A3.tmp\47A4.tmp\47A5.bat "C:\Users\Admin\Documents\Chaser Temp CRACKED\bypassed.exe""
            2⤵
            • Drops file in Drivers directory
            • Suspicious use of WriteProcessMemory
            PID:5680
            • C:\Windows\system32\openfiles.exe
              openfiles
              3⤵
                PID:5508
              • C:\Windows\system32\certutil.exe
                certutil -addstore "Root" "C:\Users\Admin\Documents\Chaser Temp CRACKED\certificate.crt"
                3⤵
                  PID:2916
                • C:\Users\Admin\Documents\Chaser Temp CRACKED\Morphine.exe
                  "C:\Users\Admin\Documents\Chaser Temp CRACKED\Morphine.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Enumerates system info in registry
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:5504
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /c start cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:2580
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:1572
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout /t 5
                        6⤵
                        • System Location Discovery: System Language Discovery
                        • Delays execution with timeout.exe
                        PID:5860
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 5504 -s 1476
                    4⤵
                    • Program crash
                    PID:6084
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5504 -ip 5504
              1⤵
                PID:5764

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\47A3.tmp\47A4.tmp\47A5.bat

                Filesize

                1KB

                MD5

                4139d82b7887de939696e636b8c4a86e

                SHA1

                42ac906cc609814eb6cc27d5d0ff93c25ff842f2

                SHA256

                3c5bee69f5de7ccf115c18fe5d908a8a8f6232178f5af7bbb74a8efeddf85647

                SHA512

                8ddb01874b1c1e37780dfe4defaae393d65e8102ba9f4d0ff67c88694aea5167402b2c748e18078c15924583418bae6fa10a627868f2c94528519bd803103ceb

              • memory/5504-3-0x0000000000030000-0x0000000000602000-memory.dmp

                Filesize

                5.8MB

              • memory/5504-4-0x0000000005870000-0x0000000005E14000-memory.dmp

                Filesize

                5.6MB

              • memory/5504-5-0x00000000052C0000-0x0000000005352000-memory.dmp

                Filesize

                584KB

              • memory/5504-6-0x0000000005080000-0x000000000508A000-memory.dmp

                Filesize

                40KB

              • memory/5504-7-0x0000000005470000-0x0000000005482000-memory.dmp

                Filesize

                72KB

              • memory/5504-8-0x0000000005540000-0x0000000005754000-memory.dmp

                Filesize

                2.1MB

              • memory/5504-9-0x000000000AD90000-0x000000000ADD2000-memory.dmp

                Filesize

                264KB

              • memory/5504-10-0x000000000AEF0000-0x000000000AFF4000-memory.dmp

                Filesize

                1.0MB

              • memory/5504-11-0x000000000B190000-0x000000000B31C000-memory.dmp

                Filesize

                1.5MB