Malware Analysis Report

2024-11-30 19:35

Sample ID 240917-qdgfrsthph
Target 92893_1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.zip
SHA256 a6cf0c3943bfff4ac0a74d2a357374fd7e758fb7442661edd9aa4a35b5851e86
Tags
agilenet discovery evasion
score
9/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
9/10

SHA256

a6cf0c3943bfff4ac0a74d2a357374fd7e758fb7442661edd9aa4a35b5851e86

Threat Level: Likely malicious

The file 92893_1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.zip was found to be: Likely malicious.

Malicious Activity Summary

agilenet discovery evasion

Looks for VirtualBox Guest Additions in registry

Looks for VMWare Tools registry key

Obfuscated with Agile.Net obfuscator

Checks BIOS information in registry

Maps connected drives based on registry

System Location Discovery: System Language Discovery

Unsigned PE

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-09-17 13:08

Signatures

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-09-17 13:08

Reported

2024-09-17 13:09

Platform

win10v2004-20240802-en

Max time kernel

34s

Max time network

37s

Command Line

"C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe"

Signatures

Looks for VirtualBox Guest Additions in registry

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

Looks for VMWare Tools registry key

evasion
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

Checks BIOS information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

Obfuscated with Agile.Net obfuscator

agilenet
Description Indicator Process Target
N/A N/A N/A N/A

Maps connected drives based on registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe

"C:\Users\Admin\AppData\Local\Temp\1dc99cc3e7310fa90a847eb75309624e7a4aa29d6968660c0c0fe24c378affe6.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 233.143.123.92.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 203.33.253.131.in-addr.arpa udp
US 8.8.8.8:53 232.168.11.51.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 59.170.16.2.in-addr.arpa udp

Files

memory/4044-0-0x0000000074E0E000-0x0000000074E0F000-memory.dmp

memory/4044-1-0x0000000000ED0000-0x0000000000FDA000-memory.dmp

memory/4044-2-0x0000000074E00000-0x00000000755B0000-memory.dmp

memory/4044-3-0x0000000005AB0000-0x0000000005B80000-memory.dmp

memory/4044-4-0x0000000006260000-0x0000000006804000-memory.dmp

memory/4044-5-0x0000000005CB0000-0x0000000005D42000-memory.dmp

memory/4044-6-0x0000000005FC0000-0x0000000006026000-memory.dmp

memory/4044-7-0x0000000005F10000-0x0000000005F1A000-memory.dmp

memory/4044-8-0x0000000006F50000-0x0000000007148000-memory.dmp

memory/4044-10-0x0000000074E00000-0x00000000755B0000-memory.dmp