Analysis
-
max time kernel
44s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 19:06
Static task
static1
Behavioral task
behavioral1
Sample
Legacy IV - V1.1.exe
Resource
win7-20240903-en
General
-
Target
Legacy IV - V1.1.exe
-
Size
3.0MB
-
MD5
a615213f1160b542f885be5fe2f0e807
-
SHA1
8ef48ff19450fa65bce8ca82188ef61a8551b7ad
-
SHA256
5fdebcc9fecc2084617bbd9fd2f55e7844f85ae16bcc8531edb5a92442e2eb58
-
SHA512
f1af7653724c363e9aca4bd75476c13e0976bf7b21314936c5250c436bf8f56bfb307e64e34e0c277873a63d2a91e3f440d449e285fde7f9dc9a277f694de1fd
-
SSDEEP
49152:X3c/GqhV0aC1jfMQ+ScvKp//dNbo4mDpt5GOQUiLVCiM+bqFsz6Z2g3VHqnVD:Xs/GnaC9MzScvK5/dQXdAUbEVXgFHq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4748-8-0x0000000005970000-0x0000000005B84000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Legacy IV - V1.1.exe -
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Legacy IV - V1.1.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Legacy IV - V1.1.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation Legacy IV - V1.1.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Legacy IV - V1.1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\serials.txt Legacy IV - V1.1.exe File opened for modification C:\Windows\SysWOW64\serials.txt Legacy IV - V1.1.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IME\serialchecker.bat Legacy IV - V1.1.exe File created C:\Windows\IME\mapper.exe Legacy IV - V1.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Legacy IV - V1.1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Legacy IV - V1.1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Legacy IV - V1.1.exe -
Kills process with taskkill 3 IoCs
pid Process 1304 taskkill.exe 1416 taskkill.exe 4844 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 4748 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe 1700 Legacy IV - V1.1.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4748 Legacy IV - V1.1.exe Token: SeDebugPrivilege 1700 Legacy IV - V1.1.exe Token: SeDebugPrivilege 1304 taskkill.exe Token: SeDebugPrivilege 1416 taskkill.exe Token: SeDebugPrivilege 4844 taskkill.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4748 wrote to memory of 1468 4748 Legacy IV - V1.1.exe 99 PID 4748 wrote to memory of 1468 4748 Legacy IV - V1.1.exe 99 PID 4748 wrote to memory of 1468 4748 Legacy IV - V1.1.exe 99 PID 4748 wrote to memory of 3148 4748 Legacy IV - V1.1.exe 101 PID 4748 wrote to memory of 3148 4748 Legacy IV - V1.1.exe 101 PID 4748 wrote to memory of 3148 4748 Legacy IV - V1.1.exe 101 PID 4748 wrote to memory of 4316 4748 Legacy IV - V1.1.exe 103 PID 4748 wrote to memory of 4316 4748 Legacy IV - V1.1.exe 103 PID 4748 wrote to memory of 4316 4748 Legacy IV - V1.1.exe 103 PID 1468 wrote to memory of 1304 1468 cmd.exe 105 PID 1468 wrote to memory of 1304 1468 cmd.exe 105 PID 1468 wrote to memory of 1304 1468 cmd.exe 105 PID 3148 wrote to memory of 1416 3148 cmd.exe 106 PID 3148 wrote to memory of 1416 3148 cmd.exe 106 PID 3148 wrote to memory of 1416 3148 cmd.exe 106 PID 4316 wrote to memory of 4844 4316 cmd.exe 107 PID 4316 wrote to memory of 4844 4316 cmd.exe 107 PID 4316 wrote to memory of 4844 4316 cmd.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\Legacy IV - V1.1.exe"C:\Users\Admin\AppData\Local\Temp\Legacy IV - V1.1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM WmiPrvSE.exe /T2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1304
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM WmiPrvSE.exe /T2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1416
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /F /IM WmiPrvSE.exe /T2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM WmiPrvSE.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding1⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\Legacy IV - V1.1.exe"C:\Users\Admin\AppData\Local\Temp\Legacy IV - V1.1.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
C:\Windows\SysWOW64\werfault.exewerfault.exe /h /shared Global\29abd9d1bbc74a218c02f20e87dbe790 /t 4052 /p 47481⤵PID:4112
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f67ea27f1d659bebaeea796ba7e8f5e5
SHA1e7814eb5be196ee31a749b70706b6bec0e84c7c1
SHA25655bd45b05184cb1dc5bf10dd64a963b86469762d8da1a81c87e8681600ba6822
SHA512bcdb293e2fd5ce6b19255445ed9869964a3d4cfb77340391a34c8d785b56301cff0b93b700bde357063b57bc2e22cfb731d2f6dee01e65922c64b40870a467cd
-
Filesize
44B
MD5484313e1dc9486f966950b9149730410
SHA13f82b23fee27ca38ee7ae8746304d360d3ec4884
SHA256d37051a46ecb6945c00ad2cadbc82d8987a4f887c2c0a7cfcaec5e966b770371
SHA5127c3c3481435513d9b1403e7e7c5404aadec1635374936b02da6908def09d4f640ec622b8dfd05fde804752527ab27b34f71617d0ff724b12dc0ed4bdcb3bf2f1