Analysis
-
max time kernel
141s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
29-06-2024 06:19
Behavioral task
behavioral1
Sample
无害_loser.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
无害_loser.exe
Resource
win10-20240611-en
General
-
Target
无害_loser.exe
-
Size
5.2MB
-
MD5
c81c10d2b6f80f12fe481141d70c536e
-
SHA1
90b79aa16857a42466fcc2181e91701ffbf5d5a1
-
SHA256
ea458deec798ececbd3fda65fc05928c0cfc4c54eccc76f68c8dfc6d1e434024
-
SHA512
1648f975ffb40ba3d2c2a5b4b672a610cc92ae7afce1f71299f0636ff931bb351a0506929596e001780c434a2b5d467cfe721f72596d1bc8a053b6c08bbcb25d
-
SSDEEP
98304:4AnfzVUmMRJDbHhGUUu4d1Ma04HFlaUxe9c4+rlNL2fSBm8b91a2:4Anfzum+nYD1z75e9P+rlN2aU8va
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/904-20-0x0000000010000000-0x0000000010214000-memory.dmp family_agenttesla -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
无害_loser.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 无害_loser.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
无害_loser.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 无害_loser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 无害_loser.exe -
Processes:
resource yara_rule behavioral2/memory/904-15-0x0000000000400000-0x000000000130A000-memory.dmp themida behavioral2/memory/904-16-0x0000000000400000-0x000000000130A000-memory.dmp themida -
Processes:
无害_loser.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 无害_loser.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
无害_loser.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Control Panel\Desktop\Wallpaper = "C:\\hotpfp.jpg" 无害_loser.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
无害_loser.exepid process 904 无害_loser.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
无害_loser.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 无害_loser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 无害_loser.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 无害_loser.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
无害_loser.exepid process 904 无害_loser.exe 904 无害_loser.exe 904 无害_loser.exe 904 无害_loser.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
无害_loser.exedescription pid process Token: SeDebugPrivilege 904 无害_loser.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\无害_loser.exe"C:\Users\Admin\AppData\Local\Temp\无害_loser.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Sets desktop wallpaper using registry
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/904-0-0x0000000000400000-0x000000000130A000-memory.dmpFilesize
15.0MB
-
memory/904-1-0x0000000073FD6000-0x0000000073FD7000-memory.dmpFilesize
4KB
-
memory/904-2-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-3-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-4-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-5-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-6-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-7-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-12-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-14-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-15-0x0000000000400000-0x000000000130A000-memory.dmpFilesize
15.0MB
-
memory/904-16-0x0000000000400000-0x000000000130A000-memory.dmpFilesize
15.0MB
-
memory/904-17-0x00000000059A0000-0x0000000005E9E000-memory.dmpFilesize
5.0MB
-
memory/904-18-0x0000000005EE0000-0x0000000005F72000-memory.dmpFilesize
584KB
-
memory/904-19-0x00000000060F0000-0x00000000060FA000-memory.dmpFilesize
40KB
-
memory/904-20-0x0000000010000000-0x0000000010214000-memory.dmpFilesize
2.1MB
-
memory/904-22-0x0000000000400000-0x000000000130A000-memory.dmpFilesize
15.0MB
-
memory/904-23-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-24-0x0000000073EE0000-0x00000000740A2000-memory.dmpFilesize
1.8MB
-
memory/904-26-0x0000000073FD6000-0x0000000073FD7000-memory.dmpFilesize
4KB