Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
bf67292051e20b9e56d15ab6aa97e020N.exe
Resource
win7-20240903-en
General
-
Target
bf67292051e20b9e56d15ab6aa97e020N.exe
-
Size
1.8MB
-
MD5
bf67292051e20b9e56d15ab6aa97e020
-
SHA1
fde26bd0c2f5a2949576671353ec83ba4d2ebf19
-
SHA256
28a1a3e5507582ca381e9a311ad857b3fa4538602da36d5307f050677387840b
-
SHA512
46dc21da298c65afc540b421fae70aa01e7d695360fe04d4388a5183fe8a75c15b46b2a857eab15c68939b457b9f2a3d4e87a9adae59755f8bb114430c129785
-
SSDEEP
49152:6yi6csvMJ+vbJCDF0CcB96kEG1ghVOuWBrmuBAt/3oDcLa:z7vjJzAqyuBAZ32cm
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4084-4-0x0000019B76810000-0x0000019B76A22000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions bf67292051e20b9e56d15ab6aa97e020N.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools bf67292051e20b9e56d15ab6aa97e020N.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bf67292051e20b9e56d15ab6aa97e020N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bf67292051e20b9e56d15ab6aa97e020N.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 9 pastebin.com 10 pastebin.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 6 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum bf67292051e20b9e56d15ab6aa97e020N.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 bf67292051e20b9e56d15ab6aa97e020N.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS bf67292051e20b9e56d15ab6aa97e020N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer bf67292051e20b9e56d15ab6aa97e020N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion bf67292051e20b9e56d15ab6aa97e020N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe 4084 bf67292051e20b9e56d15ab6aa97e020N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4084 bf67292051e20b9e56d15ab6aa97e020N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bf67292051e20b9e56d15ab6aa97e020N.exe"C:\Users\Admin\AppData\Local\Temp\bf67292051e20b9e56d15ab6aa97e020N.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084