Analysis

  • max time kernel
    102s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-09-2024 13:16

General

  • Target

    Vex Cleaner.exe

  • Size

    1.1MB

  • MD5

    afadad365922c382478237adb7358e7e

  • SHA1

    c997604934c2c33c9c6cf053284e6d328ebeed22

  • SHA256

    3f8659c025da48e22c9af49e2944d7e7f9d4e2a4e7b8ec6c7dc88791c2c2e3f9

  • SHA512

    572582f75cc5a4951d18048c3c33f7df135078ba01a7348bda7a326229a1ffc09596e5e798e96645bb37a9786c603422bc3664b7364ef5c4debd37d94b3ddbd3

  • SSDEEP

    24576:X/dngwtlaHxN8KUWVe6tw2wvKhLnekqjVnlqud+/2P+As:X/dngwwHv5VbtHw1kqXfd+/9A

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Vex Cleaner.exe
    "C:\Users\Admin\AppData\Local\Temp\Vex Cleaner.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2508
  • C:\Windows\system32\mmc.exe
    "C:\Windows\system32\mmc.exe" "C:\Windows\system32\eventvwr.msc" /s
    1⤵
    • Drops file in System32 directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2276
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4084

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2276-8-0x000000001FF50000-0x0000000020478000-memory.dmp

      Filesize

      5.2MB

    • memory/2508-0-0x00007FFA20BC3000-0x00007FFA20BC5000-memory.dmp

      Filesize

      8KB

    • memory/2508-1-0x0000011067FB0000-0x00000110680C2000-memory.dmp

      Filesize

      1.1MB

    • memory/2508-2-0x000001106A840000-0x000001106AA36000-memory.dmp

      Filesize

      2.0MB

    • memory/2508-3-0x00007FFA20BC0000-0x00007FFA21681000-memory.dmp

      Filesize

      10.8MB

    • memory/2508-4-0x00007FFA20BC0000-0x00007FFA21681000-memory.dmp

      Filesize

      10.8MB

    • memory/2508-5-0x00007FFA20BC3000-0x00007FFA20BC5000-memory.dmp

      Filesize

      8KB

    • memory/2508-6-0x00007FFA20BC0000-0x00007FFA21681000-memory.dmp

      Filesize

      10.8MB

    • memory/2508-7-0x00007FFA20BC0000-0x00007FFA21681000-memory.dmp

      Filesize

      10.8MB