Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2023 02:38
Behavioral task
behavioral1
Sample
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe
Resource
win10v2004-20231127-en
General
-
Target
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe
-
Size
154.0MB
-
MD5
652219e3762bac4398d5d0d72d53dc9b
-
SHA1
c6e5a82be097208b154b2078b5b1fb1028c75ec2
-
SHA256
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d
-
SHA512
748d104e30451122d1284445be19867b55656dc05bf666ec82e8d88f03c803690350cf5f696e0762822393e871d17dac5e4ad86e426ed36038af8964b7a62e8f
-
SSDEEP
1572864:UafzGToO0fw1GZrhqWKnUlqdoT43pv8Mx58REy0DZlecD:HfzdhbIoTY5jZAq
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/544-64-0x0000000007CD0000-0x00000000081A0000-memory.dmp family_agenttesla behavioral2/memory/544-67-0x0000000007CD0000-0x00000000081A0000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2037190880-819243489-950462038-1000\Control Panel\International\Geo\Nation 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 33579d62e29087f5f0948d5c209858ba6f811f809e39424d6776d6a2b8131e2d.exe