Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
06-12-2023 02:38
Behavioral task
behavioral1
Sample
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe
Resource
win10v2004-20231127-en
General
-
Target
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe
-
Size
154.0MB
-
MD5
652219e3762bac4398d5d0d72d53dc9b
-
SHA1
c6e5a82be097208b154b2078b5b1fb1028c75ec2
-
SHA256
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d
-
SHA512
748d104e30451122d1284445be19867b55656dc05bf666ec82e8d88f03c803690350cf5f696e0762822393e871d17dac5e4ad86e426ed36038af8964b7a62e8f
-
SSDEEP
1572864:UafzGToO0fw1GZrhqWKnUlqdoT43pv8Mx58REy0DZlecD:HfzdhbIoTY5jZAq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3012-64-0x00000000074F0000-0x00000000079C0000-memory.dmp family_agenttesla behavioral1/memory/3012-67-0x00000000074F0000-0x00000000079C0000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe