General
-
Target
Aware_Temp.exe
-
Size
2.1MB
-
Sample
240910-tjd5dasakq
-
MD5
f376f2b4f23e310203ed89e557b9b536
-
SHA1
180528f79584d6fdc1b2f778fd37052469f4498d
-
SHA256
4e61ea496619f7a20363fee6758481d56a2c11700595a31ad22fa4e3641bb0c6
-
SHA512
8f1697d3d9f36ecd67a67e4fcf43f54ba62c5ebf129a74a55717297207140182b8e56218f6d5371dd9a63edd74838170a7df868ce27ef77a8645ac669fa031e9
-
SSDEEP
49152:zVVRm2N7hDb0oiWnl9ACryoLoNTOzba1K5uYNwUT0:zVau7hDb06uCuM+TrK8UT0
Behavioral task
behavioral1
Sample
Aware_Temp.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Aware_Temp.exe
-
Size
2.1MB
-
MD5
f376f2b4f23e310203ed89e557b9b536
-
SHA1
180528f79584d6fdc1b2f778fd37052469f4498d
-
SHA256
4e61ea496619f7a20363fee6758481d56a2c11700595a31ad22fa4e3641bb0c6
-
SHA512
8f1697d3d9f36ecd67a67e4fcf43f54ba62c5ebf129a74a55717297207140182b8e56218f6d5371dd9a63edd74838170a7df868ce27ef77a8645ac669fa031e9
-
SSDEEP
49152:zVVRm2N7hDb0oiWnl9ACryoLoNTOzba1K5uYNwUT0:zVau7hDb06uCuM+TrK8UT0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect Neshta payload
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
AgentTesla payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Modifies system executable filetype association
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2