Analysis
-
max time kernel
20s -
max time network
16s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
29-06-2024 22:59
Behavioral task
behavioral1
Sample
WZAgent.exe
Resource
win10-20240404-en
General
-
Target
WZAgent.exe
-
Size
26.2MB
-
MD5
4cf978f2749291d8d9a722cf8bd9d9ea
-
SHA1
2580a9be8bc6994987cc4951a4690efd7077ea92
-
SHA256
ea8779bb436427af92289d75ee7510e1784bf6772729091abcc350cdf773058c
-
SHA512
d1ba2ea6a06cf5241bd26319b7bd2da7cb3ca0453496703fa66413cc56edf9893414a970dfb67451cfb85ef735305986958ba852287b3dc63b7cf28ab351d61d
-
SSDEEP
786432:Ov1EWULlsocwpd3XHEquH6rdEePFG/7vG43EY6:Ov1EWusor8j6r714
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4928-26-0x0000000022960000-0x0000000022B52000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
WZAgent.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ WZAgent.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion WZAgent.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion WZAgent.exe -
Loads dropped DLL 1 IoCs
Processes:
WZAgent.exepid process 4928 WZAgent.exe -
Obfuscated with Agile.Net obfuscator 2 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/4928-8-0x0000000000400000-0x0000000002606000-memory.dmp agile_net behavioral1/memory/4928-9-0x0000000000400000-0x0000000002606000-memory.dmp agile_net -
Processes:
resource yara_rule behavioral1/memory/4928-8-0x0000000000400000-0x0000000002606000-memory.dmp themida behavioral1/memory/4928-9-0x0000000000400000-0x0000000002606000-memory.dmp themida \Users\Admin\AppData\Local\Temp\883e7960-a7ed-4b7f-b414-8446eabbb7d5\AgileDotNetRT64.dll themida behavioral1/memory/4928-17-0x00007FFCFD760000-0x00007FFCFE289000-memory.dmp themida behavioral1/memory/4928-19-0x00007FFCFD760000-0x00007FFCFE289000-memory.dmp themida behavioral1/memory/4928-29-0x00007FFCFD760000-0x00007FFCFE289000-memory.dmp themida -
Processes:
WZAgent.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WZAgent.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
WZAgent.exepid process 4928 WZAgent.exe 4928 WZAgent.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WZAgent.exedescription pid process Token: SeDebugPrivilege 4928 WZAgent.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"C:\Users\Admin\AppData\Local\Temp\WZAgent.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\883e7960-a7ed-4b7f-b414-8446eabbb7d5\AgileDotNetRT64.dllFilesize
4.0MB
MD58e839b26c5efed6f41d6e854e5e97f5b
SHA15cb71374f72bf6a63ff65a6cda57ff66c3e54836
SHA2561f2489fcd11f85db723f977f068988e81ed28581a4aec352ba4a2dc31419a011
SHA51292446d7c2ccf41408d0a6be604b9aba3050192b40be887c2cee8f9aea0bd855503d6b827a8bdd554addd8d7c8ec947033f49060db493f756c3b2b70c04a17093
-
memory/4928-17-0x00007FFCFD760000-0x00007FFCFE289000-memory.dmpFilesize
11.2MB
-
memory/4928-29-0x00007FFCFD760000-0x00007FFCFE289000-memory.dmpFilesize
11.2MB
-
memory/4928-5-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-4-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-3-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-8-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB
-
memory/4928-9-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB
-
memory/4928-20-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-31-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-2-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-10-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-19-0x00007FFCFD760000-0x00007FFCFE289000-memory.dmpFilesize
11.2MB
-
memory/4928-23-0x00007FFD11700000-0x00007FFD1182C000-memory.dmpFilesize
1.2MB
-
memory/4928-24-0x0000000021B00000-0x0000000022958000-memory.dmpFilesize
14.3MB
-
memory/4928-25-0x0000000020B10000-0x0000000020B86000-memory.dmpFilesize
472KB
-
memory/4928-26-0x0000000022960000-0x0000000022B52000-memory.dmpFilesize
1.9MB
-
memory/4928-27-0x00007FFD19ED0000-0x00007FFD1A119000-memory.dmpFilesize
2.3MB
-
memory/4928-1-0x00007FFD19F31000-0x00007FFD19F32000-memory.dmpFilesize
4KB
-
memory/4928-30-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB
-
memory/4928-0-0x0000000000400000-0x0000000002606000-memory.dmpFilesize
34.0MB