Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 15:15
Static task
static1
General
-
Target
Sleettz Virtualization.exe
-
Size
2.0MB
-
MD5
393a0f8a3bacd8ade71d1874fde3568e
-
SHA1
9a56d4def655c0805714b32198000d0b177694da
-
SHA256
85a8d0cee047255ca84d6f48058a553a783745b13196151c5dc34ade36599a0e
-
SHA512
672ded8eaa8f1857c55b6cf6cdae1977c01a7538217fb3aecdc2f1339e94e2882495408772b6c935755c38165520c66850240f1302ba12d005945d8e354d48cb
-
SSDEEP
49152:X1/wXVtR1NNZHNNNNNNNXv2N8FR1NNZHNNNNNNNXv2N8lITYbNbNWo4kSH3OqtwE:lwFtR1NNZHNNNNNNNXv2N8FR1NNZHNNQ
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/3984-8-0x00000000063D0000-0x00000000065E4000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Sleettz Virtualization.exe -
Looks for VMWare Tools registry key 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Sleettz Virtualization.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Sleettz Virtualization.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Sleettz Virtualization.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 3 IoCs
pid Process 3648 timeout.exe 1020 timeout.exe 3388 timeout.exe -
Enumerates system info in registry 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSerialNumber Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Sleettz Virtualization.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Sleettz Virtualization.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSerialNumber = "L3TPDSUH7T" Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Sleettz Virtualization.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Sleettz Virtualization.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Sleettz Virtualization.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 3984 Sleettz Virtualization.exe 5364 Sleettz Virtualization.exe 5364 Sleettz Virtualization.exe 5364 Sleettz Virtualization.exe 5364 Sleettz Virtualization.exe 5364 Sleettz Virtualization.exe 5364 Sleettz Virtualization.exe 1672 Sleettz Virtualization.exe 1672 Sleettz Virtualization.exe 1672 Sleettz Virtualization.exe 1672 Sleettz Virtualization.exe 1672 Sleettz Virtualization.exe 1672 Sleettz Virtualization.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3984 Sleettz Virtualization.exe Token: SeDebugPrivilege 5364 Sleettz Virtualization.exe Token: SeDebugPrivilege 1672 Sleettz Virtualization.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 3984 wrote to memory of 3888 3984 Sleettz Virtualization.exe 93 PID 3984 wrote to memory of 3888 3984 Sleettz Virtualization.exe 93 PID 3984 wrote to memory of 3888 3984 Sleettz Virtualization.exe 93 PID 3888 wrote to memory of 3600 3888 cmd.exe 95 PID 3888 wrote to memory of 3600 3888 cmd.exe 95 PID 3888 wrote to memory of 3600 3888 cmd.exe 95 PID 3600 wrote to memory of 3648 3600 cmd.exe 97 PID 3600 wrote to memory of 3648 3600 cmd.exe 97 PID 3600 wrote to memory of 3648 3600 cmd.exe 97 PID 5364 wrote to memory of 908 5364 Sleettz Virtualization.exe 108 PID 5364 wrote to memory of 908 5364 Sleettz Virtualization.exe 108 PID 5364 wrote to memory of 908 5364 Sleettz Virtualization.exe 108 PID 908 wrote to memory of 4504 908 cmd.exe 110 PID 908 wrote to memory of 4504 908 cmd.exe 110 PID 908 wrote to memory of 4504 908 cmd.exe 110 PID 4504 wrote to memory of 1020 4504 cmd.exe 112 PID 4504 wrote to memory of 1020 4504 cmd.exe 112 PID 4504 wrote to memory of 1020 4504 cmd.exe 112 PID 1672 wrote to memory of 4268 1672 Sleettz Virtualization.exe 114 PID 1672 wrote to memory of 4268 1672 Sleettz Virtualization.exe 114 PID 1672 wrote to memory of 4268 1672 Sleettz Virtualization.exe 114 PID 4268 wrote to memory of 2452 4268 cmd.exe 116 PID 4268 wrote to memory of 2452 4268 cmd.exe 116 PID 4268 wrote to memory of 2452 4268 cmd.exe 116 PID 2452 wrote to memory of 3388 2452 cmd.exe 118 PID 2452 wrote to memory of 3388 2452 cmd.exe 118 PID 2452 wrote to memory of 3388 2452 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sleettz Virtualization.exe"C:\Users\Admin\AppData\Local\Temp\Sleettz Virtualization.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.execmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3648
-
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\Sleettz Virtualization.exe"C:\Users\Admin\AppData\Local\Temp\Sleettz Virtualization.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5364 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\cmd.execmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Sleettz Virtualization.exe"C:\Users\Admin\AppData\Local\Temp\Sleettz Virtualization.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.execmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3388
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
357B
MD5806e333a0eab7d500426c2d3596f1a6c
SHA1e78a9ebcda5b1b913d46b84b205671f11fe21b49
SHA25694dea894830a671136b1d1638b713ccec86df81eabcaa8c363e1a2b1aaa6f1a8
SHA512cce334c77b37dadaacb85eb9d9010a3e3894b37ace34f9b35702cd7c81ba79120a4258036222888ae5543d0a4f2d61170f281332298656b56424f8aa3798410b
-
Filesize
476B
MD5559fd446526463253797287e3153db74
SHA1fb69dcdd1311121f8e3756202b84f132c7cf8f61
SHA256f159c71b28f1de6bd327314f0b33dec8e9a36acafe1dc8c6d44f915ca388606c
SHA512ed06e6dcc0ba32eaabc09cb29833f57fe64ddc6d73c39ef65f6b414abb9d665d73d7fbc5fe6907a48a7bc46c4f3b2ecd8c3b186bc69c6215d35d5c7d0421b6d4
-
Filesize
1KB
MD534eb07a82ee50ca6baa787247463d761
SHA1d0283c31a3d5fdd746f2a9134cf56ee71b6594b7
SHA256870f5a3c36b2dc5ccecb039d7181b0e0eb86f457eca51b78c7939cc4855c8cf7
SHA5122f734ced93cf384032a4166bd3db14bff0c043915ab382690cb3e3e825521aaf674e06869af212375f344481184d44b5d82a229a25fac21386d192b97e1ceef1
-
Filesize
148B
MD5fd478a2f5fcca58a395af7d3a4f04c37
SHA132adde9591dcd234619aa35bc68379d95a445ac6
SHA2569549ab59868dbbe8835e27a5163b4b7bc05fe50cc51d2fd012311401253a4f16
SHA512ad22c1b474f140ea9b7754e75b881420b315b5243a04984165ab661059e28841287d3d2ce912f303ce59090bc4b02de1780d64065a7e7362284b2b8f01e98a9e
-
Filesize
222B
MD5c5921b32eb94b26582cf66c954c8dc43
SHA1980c7e007f8ecd33bdcc8afb3c899c60d8e6030c
SHA2562574f98bf939fa2a8aeed3a21d0dec0608290e479558ed5225f6bc1271e91ba0
SHA51250324b53ff290cfc91bf7ddb612d2b38a7834b16ac8f76acbe144c6b08f420ecdfbdf644c1f9d5c53c00fbdb8d8aefb6de3cb7cf40d4797fd160897b9b6c66fd