Analysis
-
max time kernel
102s -
max time network
106s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
29/12/2023, 23:07
Behavioral task
behavioral1
Sample
GV_Loader (2).exe
Resource
win10-20231215-en
5 signatures
150 seconds
General
-
Target
GV_Loader (2).exe
-
Size
3.7MB
-
MD5
8a85f22dabc8fd0d60302180a4b07361
-
SHA1
21de805771843787a9e135c9a8ec8694035b649e
-
SHA256
9e3dd3a62a1612774cfcbf5354a5e33f4e2db403428401075eed1dae0d6d7f8d
-
SHA512
6792a9f17e8079e6c87a6b200e99a9495c62769fd67b5f639ceab9fc638926c5bf02d9eadd5053688241ad2a0b59007eaa8891ea85a95ca7fb869ac514a1a080
-
SSDEEP
98304:vdlcvscDQH7Z2sQ/6vRPSxU07Ps0p/3sRRrw5vsFFjG3x:Dt1+yFSOMN/cRRMUFFj
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/576-5-0x000001B4597E0000-0x000001B4599F6000-memory.dmp family_agenttesla -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/576-0-0x000001B43EB10000-0x000001B43EEC8000-memory.dmp agile_net -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS GV_Loader (2).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer GV_Loader (2).exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion GV_Loader (2).exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 576 GV_Loader (2).exe