Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 06:31
Static task
static1
Behavioral task
behavioral1
Sample
b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe
Resource
win10v2004-20240802-en
General
-
Target
b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe
-
Size
3.2MB
-
MD5
06dcb15ae610d9451fb568bc536069ee
-
SHA1
611af21b221bd004e7546d2603793de501b4f38d
-
SHA256
b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252
-
SHA512
9ce44cf3089f267b8db94ae4bdb3e78655fefe0aab4125cae956f0fbef4aa161e6eaca1f3ac0b755d75e10a1e31a5231c450ac8a04fc461bd1dbf45ee92c19fb
-
SSDEEP
49152:tJkY6l5vePmrlqqZZp/wuERzibxCfAz7x:bkY6l5vePGlp99b/x
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4920-49-0x0000000006520000-0x0000000006732000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe -
Executes dropped EXE 6 IoCs
pid Process 4920 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4020 icsys.icn.exe 3648 explorer.exe 1168 spoolsv.exe 4664 svchost.exe 512 spoolsv.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\resources\\themes\\explorer.exe RO" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\resources\\svchost.exe RO" svchost.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\explorer.exe explorer.exe File opened for modification C:\Windows\SysWOW64\explorer.exe svchost.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\Resources\tjud.exe explorer.exe File opened for modification C:\Windows\Resources\Themes\icsys.icn.exe b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe File opened for modification \??\c:\windows\resources\themes\explorer.exe icsys.icn.exe File opened for modification \??\c:\windows\resources\spoolsv.exe explorer.exe File opened for modification \??\c:\windows\resources\svchost.exe spoolsv.exe -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsys.icn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spoolsv.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 4020 icsys.icn.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3648 explorer.exe 4664 svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4920 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 4020 icsys.icn.exe 4020 icsys.icn.exe 3648 explorer.exe 3648 explorer.exe 1168 spoolsv.exe 1168 spoolsv.exe 4664 svchost.exe 4664 svchost.exe 512 spoolsv.exe 512 spoolsv.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4920 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 85 PID 4356 wrote to memory of 4920 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 85 PID 4356 wrote to memory of 4920 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 85 PID 4356 wrote to memory of 4020 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 89 PID 4356 wrote to memory of 4020 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 89 PID 4356 wrote to memory of 4020 4356 b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe 89 PID 4020 wrote to memory of 3648 4020 icsys.icn.exe 91 PID 4020 wrote to memory of 3648 4020 icsys.icn.exe 91 PID 4020 wrote to memory of 3648 4020 icsys.icn.exe 91 PID 3648 wrote to memory of 1168 3648 explorer.exe 92 PID 3648 wrote to memory of 1168 3648 explorer.exe 92 PID 3648 wrote to memory of 1168 3648 explorer.exe 92 PID 1168 wrote to memory of 4664 1168 spoolsv.exe 93 PID 1168 wrote to memory of 4664 1168 spoolsv.exe 93 PID 1168 wrote to memory of 4664 1168 spoolsv.exe 93 PID 4664 wrote to memory of 512 4664 svchost.exe 94 PID 4664 wrote to memory of 512 4664 svchost.exe 94 PID 4664 wrote to memory of 512 4664 svchost.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe"C:\Users\Admin\AppData\Local\Temp\b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4356 -
\??\c:\users\admin\appdata\local\temp\b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exec:\users\admin\appdata\local\temp\b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
-
C:\Windows\Resources\Themes\icsys.icn.exeC:\Windows\Resources\Themes\icsys.icn.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4020 -
\??\c:\windows\resources\themes\explorer.exec:\windows\resources\themes\explorer.exe3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3648 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe SE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
\??\c:\windows\resources\svchost.exec:\windows\resources\svchost.exe5⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4664 -
\??\c:\windows\resources\spoolsv.exec:\windows\resources\spoolsv.exe PR6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:512
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\b6d43405e5d36e6e74de2ff2d22d864edb0db18f9db4e928def7155054b4e252.exe
Filesize3.1MB
MD50c33284728a138decf9bf5229bc1272a
SHA141bac3740aee663620d82503e7dda4cd3f564eb7
SHA256ad013bc1676f0fb7f9dd576d5d96e4b121770756abeb70379e01d0003dca8681
SHA5120c9a0647418ffdf03ca31db1fbe7152a301953d1fe9a7115f18271c4690ed72af0e2b0acf9f6ad05234e6faa7cba759d815435cb67536a1253f1959a953a6622
-
Filesize
135KB
MD500780eb851421de5ac1e674adf2d6231
SHA1e2355b76db66a06cc6aeb2209a6dfdd7fc1058f6
SHA256d4cbdad4a991d006a39b6ba179aa4449371d072a402c4eb83670346ef880cfee
SHA512e06904351f300c9b273c063f630d6d4f56a8258d324575ae633441446ceec48de24c0e763a9bbf5f927242ab12fc1d2541d897f6c1cad0011fb40cf9078725de
-
Filesize
135KB
MD5a082983f3d6f012f8b211bcac9df371d
SHA18f13e36f5ec891cf4eccfc77694b6268f50f07d9
SHA2569a45fb25503111878442721305dfd9f5c9bd9cf3e60e1d5b5e9c754b48166253
SHA512b5d3c96efb0d84ee4d7c968ea90d7c75b8203667ea9beaa655e6507f03d146e5fccbfb45561559085fdba9e016c645959f6e510cb8a43a351aa4ac856253b04a
-
Filesize
135KB
MD5b0d90b18e84c7ddcf73b7945179ee83a
SHA110344dd21092c3d5e8099a1a485589de1855a58e
SHA256b98547ea39f8b4791d3f56135eb55410f962aebe9771cf4aaa23c7659e028793
SHA51216626bf2b9c1a9bd616e0d62e013dca646a057f9fade24552940fc0f5575e33e4b19d5684d726f69c2c5d3237d756caa7416bee19ac59aa32ab1e8fd94c46415
-
Filesize
135KB
MD516f8be46771bf018399fd5847780fdf0
SHA1332b736810a66710c1061b1440cdf2ea7901b8fa
SHA25671caf84b25b929bbba43404e5a97242791e945b4b5989ac8cb9310632ebd91f1
SHA5120457c8e7e0667bfeb15fd41794bfefe0180f613f2a7f636ee889fa49a62ce74f6119aa5b9baea46e67507199cfea51346d9eeb55df7059c51caf9ad678bb6272