Analysis
-
max time kernel
122s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
spoofer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
spoofer.exe
Resource
win10v2004-20240802-en
General
-
Target
spoofer.exe
-
Size
690KB
-
MD5
254734b009bab35cda2c3b853868ead4
-
SHA1
d355217e7b2f4d6950b590e2cb56570e0d7e5a57
-
SHA256
62d224143ab1462293c94cc449f2174d1bf8a3635f22614ba391bc3a4f331e74
-
SHA512
cfec6c6177cd9b43d5f92b3c152dd9851339dcbe63a123a7f72606a222041c4134491b29830d58b09217ff9c7e6374fb1e83acaf3d4158c8dcb9340467a912c5
-
SSDEEP
6144:lBKjK2LFzZNf/ULF7XqPhjYXFuc/xBOUzjIGcmKqc4cq2cctc/wccyQcycnt4c6u:lMjnNf30FnhV7C0FnhVjp
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/files/0x000300000002327a-3.dat family_agenttesla -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Kopx_Perm.exe -
Executes dropped EXE 17 IoCs
pid Process 988 Kopx_Perm.exe 1252 winxsrcsv64.exe 1060 winxsrcsv64.exe 788 winxsrcsv64.exe 2408 winxsrcsv64.exe 1948 winxsrcsv64.exe 540 winxsrcsv64.exe 3216 winxsrcsv64.exe 4300 winxsrcsv64.exe 1492 winxsrcsv64.exe 1408 winxsrcsv64.exe 1908 winxsrcsv64.exe 4480 winxsrcsv64.exe 612 winxsrcsv64.exe 4740 winxsrcsv64.exe 3500 winxsrcsv64.exe 3284 winxsrcsv64.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 13 raw.githubusercontent.com 14 raw.githubusercontent.com 47 raw.githubusercontent.com -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Kopx\Kopx_Perm.exe spoofer.exe File created C:\Windows\Globalization\winxsrcsv64.sys Kopx_Perm.exe File created C:\Windows\Globalization\winxsrcsv64.exe Kopx_Perm.exe File created C:\Windows\Globalization\iqvw64e.sys Kopx_Perm.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Kopx_Perm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Kopx_Perm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Kopx_Perm.exe -
Suspicious behavior: LoadsDriver 16 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2436 wrote to memory of 988 2436 spoofer.exe 93 PID 2436 wrote to memory of 988 2436 spoofer.exe 93 PID 988 wrote to memory of 1252 988 Kopx_Perm.exe 99 PID 988 wrote to memory of 1252 988 Kopx_Perm.exe 99 PID 988 wrote to memory of 1060 988 Kopx_Perm.exe 101 PID 988 wrote to memory of 1060 988 Kopx_Perm.exe 101 PID 988 wrote to memory of 788 988 Kopx_Perm.exe 103 PID 988 wrote to memory of 788 988 Kopx_Perm.exe 103 PID 988 wrote to memory of 2408 988 Kopx_Perm.exe 105 PID 988 wrote to memory of 2408 988 Kopx_Perm.exe 105 PID 988 wrote to memory of 1948 988 Kopx_Perm.exe 107 PID 988 wrote to memory of 1948 988 Kopx_Perm.exe 107 PID 988 wrote to memory of 540 988 Kopx_Perm.exe 109 PID 988 wrote to memory of 540 988 Kopx_Perm.exe 109 PID 988 wrote to memory of 3216 988 Kopx_Perm.exe 111 PID 988 wrote to memory of 3216 988 Kopx_Perm.exe 111 PID 988 wrote to memory of 4300 988 Kopx_Perm.exe 113 PID 988 wrote to memory of 4300 988 Kopx_Perm.exe 113 PID 988 wrote to memory of 1492 988 Kopx_Perm.exe 115 PID 988 wrote to memory of 1492 988 Kopx_Perm.exe 115 PID 988 wrote to memory of 1408 988 Kopx_Perm.exe 117 PID 988 wrote to memory of 1408 988 Kopx_Perm.exe 117 PID 988 wrote to memory of 1908 988 Kopx_Perm.exe 119 PID 988 wrote to memory of 1908 988 Kopx_Perm.exe 119 PID 988 wrote to memory of 4480 988 Kopx_Perm.exe 121 PID 988 wrote to memory of 4480 988 Kopx_Perm.exe 121 PID 988 wrote to memory of 612 988 Kopx_Perm.exe 123 PID 988 wrote to memory of 612 988 Kopx_Perm.exe 123 PID 988 wrote to memory of 4740 988 Kopx_Perm.exe 125 PID 988 wrote to memory of 4740 988 Kopx_Perm.exe 125 PID 988 wrote to memory of 3500 988 Kopx_Perm.exe 127 PID 988 wrote to memory of 3500 988 Kopx_Perm.exe 127 PID 988 wrote to memory of 3284 988 Kopx_Perm.exe 129 PID 988 wrote to memory of 3284 988 Kopx_Perm.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\spoofer.exe"C:\Users\Admin\AppData\Local\Temp\spoofer.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\Kopx\Kopx_Perm.exe"C:\Windows\Kopx\Kopx_Perm.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SU AUTO3⤵
- Executes dropped EXE
PID:1252
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /BS PKHOJAD9K8NYR2N33⤵
- Executes dropped EXE
PID:1060
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /CS PKHOJAD9K8NYR2N33⤵
- Executes dropped EXE
PID:788
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SS PKHOJAD9K8NYR2N33⤵
- Executes dropped EXE
PID:2408
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SM "System manufacturer"3⤵
- Executes dropped EXE
PID:1948
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SP "System Product Name"3⤵
- Executes dropped EXE
PID:540
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SV "System Version"3⤵
- Executes dropped EXE
PID:3216
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SK "SKU"3⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /BT "Default string"3⤵
- Executes dropped EXE
PID:1492
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /BLC "Default string"3⤵
- Executes dropped EXE
PID:1408
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /CM "Default string"3⤵
- Executes dropped EXE
PID:1908
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /CV "Default string"3⤵
- Executes dropped EXE
PID:4480
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /CA "Default string"3⤵
- Executes dropped EXE
PID:612
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /CSK "Default string"3⤵
- Executes dropped EXE
PID:4740
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /SF "To be filled by O.E.M."3⤵
- Executes dropped EXE
PID:3500
-
-
C:\Windows\Globalization\winxsrcsv64.exe"winxsrcsv64.exe" /PSN PKHOJAD9K8NYR2N33⤵
- Executes dropped EXE
PID:3284
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
379KB
MD591a31f23f3e50bd0a722e605687aed1e
SHA1f56fa26aaccdd6eb3f1ea53f06674b01327cd7c4
SHA256818d6d87d0facc03354bf7b0748467cf61040031248ba8b46045ed9dbe4053d8
SHA512649ee112c0e9d0c63c199f0dee84332f915af336dd7ad0ff70cbd49cc148c832182ff748c67fe1dee958215ea4a095545d1a93fdeb90fbdeb6f98076b499aab0
-
Filesize
5.5MB
MD58c13d2fd7836abcfe22c00ace0061d40
SHA13c9640ec84a86cb10e87f2b2d8217f034aab1d5b
SHA256cd665494b4a760a948b940d3bbae302134c282deee633f04343fe34790406001
SHA5123c192fe7231e7c0306521c2701a3c9eeac0fd0091f6d59ef0f35a2dca193fcf5ff36008065838b2cabc92757708525a4d500e315a5502cbd8d7a6e5850255285