Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/09/2024, 14:46
Static task
static1
Behavioral task
behavioral1
Sample
comet.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
key.txt
Resource
win11-20240802-en
General
-
Target
comet.exe
-
Size
1.2MB
-
MD5
01ebbbb0e2be2e83ee16356f9d0d0cf5
-
SHA1
1c21379e4deb3faecc927cdbd70f25f8f42c74d8
-
SHA256
2b04ca0db9427df8711aba88c6263c2ab3639c54d4c6cd78ae5197b057041b03
-
SHA512
3b68df217a9888b3313c7036d6ef1fb7b7986dd6a1621aa0b70654797d53e2c57982d9363c070ceef136034db710ebf901a03fb210fb4b036d5d557d68f5d5c0
-
SSDEEP
24576:I1NJjDBAOySOTQcPTAcySiDNpfVkqgfPyU8/oa8reuaDH40:InJjDaOyL70nS4pfVkqgy6r3aE
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/660-7-0x0000000005D70000-0x0000000005F82000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language comet.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS comet.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer comet.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion comet.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 660 comet.exe Token: SeDebugPrivilege 720 taskmgr.exe Token: SeSystemProfilePrivilege 720 taskmgr.exe Token: SeCreateGlobalPrivilege 720 taskmgr.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe -
Suspicious use of SendNotifyMessage 26 IoCs
pid Process 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe 720 taskmgr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\comet.exe"C:\Users\Admin\AppData\Local\Temp\comet.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:660
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /01⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:720