Analysis
-
max time kernel
98s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 23:13
Behavioral task
behavioral1
Sample
wfs4r3.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
VertaxNew/Vertax.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
VertaxNew/qqSnA.dll
Resource
win10v2004-20240802-en
General
-
Target
VertaxNew/Vertax.exe
-
Size
4.3MB
-
MD5
32980bf90249d39c2bc463e6fb5cefa7
-
SHA1
76e18853ef019cff4b0015d1a6f8c47f3f506eba
-
SHA256
ed2d5f70ec106e4274bca6a85022a1fffad82c66745bde3c876962c06b75b61b
-
SHA512
156c9ffce33bf7b858bd85da726aa6ef6d8e9eee51d6c6072777037505619b144e332634158172cf36dcd3fa432fb266c32d1422f698ad1b4a9ca5087ed8c550
-
SSDEEP
98304:1GZqOKXmi+r5natSim9FH9yMpPsB3j2pmvLC/2CxEchlN36r:1GZqrXX+VneSimDHEMpPSKpmvLI7xEcA
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/1272-17-0x0000000006C50000-0x0000000006E64000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Vertax.exe -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions Vertax.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools Vertax.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Vertax.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Vertax.exe -
resource yara_rule behavioral2/memory/1272-10-0x0000000000500000-0x0000000000E6A000-memory.dmp themida behavioral2/memory/1272-11-0x0000000000500000-0x0000000000E6A000-memory.dmp themida behavioral2/memory/1272-34-0x0000000000500000-0x0000000000E6A000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Vertax.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Vertax.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Vertax.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1272 Vertax.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Vertax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2856 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Vertax.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Vertax.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Vertax.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe 1272 Vertax.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1272 Vertax.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1272 wrote to memory of 3888 1272 Vertax.exe 94 PID 1272 wrote to memory of 3888 1272 Vertax.exe 94 PID 1272 wrote to memory of 3888 1272 Vertax.exe 94 PID 3888 wrote to memory of 4100 3888 cmd.exe 96 PID 3888 wrote to memory of 4100 3888 cmd.exe 96 PID 3888 wrote to memory of 4100 3888 cmd.exe 96 PID 4100 wrote to memory of 2856 4100 cmd.exe 98 PID 4100 wrote to memory of 2856 4100 cmd.exe 98 PID 4100 wrote to memory of 2856 4100 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\VertaxNew\Vertax.exe"C:\Users\Admin\AppData\Local\Temp\VertaxNew\Vertax.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Maps connected drives based on registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c start cmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Response: {"success":false,"message":"Session not found. Use latest code. You can only have app opened 1 at a time."} && timeout /t 5"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.execmd /C "color b && title Error && echo Signature checksum failed. Request was tampered with or session ended most likely. & echo: & echo Response: {"success":false,"message":"Session not found. Use latest code. You can only have app opened 1 at a time."} && timeout /t 5"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\timeout.exetimeout /t 54⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2856
-
-
-