Analysis
-
max time kernel
13s -
max time network
12s -
platform
windows11-21h2_x64 -
resource
win11-20240611-en -
resource tags
arch:x64arch:x86image:win11-20240611-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-06-2024 19:58
General
-
Target
WZAgent (1).exe
-
Size
26.2MB
-
MD5
4cf978f2749291d8d9a722cf8bd9d9ea
-
SHA1
2580a9be8bc6994987cc4951a4690efd7077ea92
-
SHA256
ea8779bb436427af92289d75ee7510e1784bf6772729091abcc350cdf773058c
-
SHA512
d1ba2ea6a06cf5241bd26319b7bd2da7cb3ca0453496703fa66413cc56edf9893414a970dfb67451cfb85ef735305986958ba852287b3dc63b7cf28ab351d61d
-
SSDEEP
786432:Ov1EWULlsocwpd3XHEquH6rdEePFG/7vG43EY6:Ov1EWusor8j6r714
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1428-23-0x0000000020350000-0x0000000020542000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
WZAgent (1).exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZAgent (1).exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WZAgent (1).exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZAgent (1).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZAgent (1).exe -
Loads dropped DLL 1 IoCs
Processes:
WZAgent (1).exepid process 1428 WZAgent (1).exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1428-7-0x0000000000400000-0x0000000002606000-memory.dmp agile_net behavioral1/memory/1428-8-0x0000000000400000-0x0000000002606000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/1428-7-0x0000000000400000-0x0000000002606000-memory.dmp themida behavioral1/memory/1428-8-0x0000000000400000-0x0000000002606000-memory.dmp themida C:\Users\Admin\AppData\Local\Temp\883e7960-a7ed-4b7f-b414-8446eabbb7d5\AgileDotNetRT64.dll themida behavioral1/memory/1428-15-0x00007FF945850000-0x00007FF946379000-memory.dmp themida behavioral1/memory/1428-17-0x00007FF945850000-0x00007FF946379000-memory.dmp themida behavioral1/memory/1428-25-0x00007FF945850000-0x00007FF946379000-memory.dmp themida -
Processes:
WZAgent (1).exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WZAgent (1).exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
WZAgent (1).exepid process 1428 WZAgent (1).exe 1428 WZAgent (1).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WZAgent (1).exedescription pid process Token: SeDebugPrivilege 1428 WZAgent (1).exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WZAgent (1).exe"C:\Users\Admin\AppData\Local\Temp\WZAgent (1).exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\883e7960-a7ed-4b7f-b414-8446eabbb7d5\AgileDotNetRT64.dllFilesize
4.0MB
MD58e839b26c5efed6f41d6e854e5e97f5b
SHA15cb71374f72bf6a63ff65a6cda57ff66c3e54836
SHA2561f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011
SHA51292446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093
-
memory/1428-15-0x00007FF945850000-0x00007FF946379000-memory.dmpFilesize
11.2MB
-
memory/1428-17-0x00007FF945850000-0x00007FF946379000-memory.dmpFilesize
11.2MB
-
memory/1428-0-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB
-
memory/1428-4-0x00007FF968580000-0x00007FF96863D000-memory.dmpFilesize
756KB
-
memory/1428-7-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB
-
memory/1428-8-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB
-
memory/1428-2-0x00007FF968580000-0x00007FF96863D000-memory.dmpFilesize
756KB
-
memory/1428-1-0x00007FF96859A000-0x00007FF96859B000-memory.dmpFilesize
4KB
-
memory/1428-3-0x00007FF968580000-0x00007FF96863D000-memory.dmpFilesize
756KB
-
memory/1428-20-0x00007FF95B370000-0x00007FF95B4BF000-memory.dmpFilesize
1.3MB
-
memory/1428-21-0x0000000021010000-0x0000000021E68000-memory.dmpFilesize
14.3MB
-
memory/1428-22-0x000000001E130000-0x000000001E1A6000-memory.dmpFilesize
472KB
-
memory/1428-23-0x0000000020350000-0x0000000020542000-memory.dmpFilesize
1.9MB
-
memory/1428-25-0x00007FF945850000-0x00007FF946379000-memory.dmpFilesize
11.2MB
-
memory/1428-26-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB