Analysis

  • max time kernel
    102s
  • max time network
    106s
  • platform
    windows11-21h2_x64
  • resource
    win11-20231215-en
  • resource tags

    arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    29/12/2023, 23:07

General

  • Target

    GV_Loader (2).exe

  • Size

    3.7MB

  • MD5

    8a85f22dabc8fd0d60302180a4b07361

  • SHA1

    21de805771843787a9e135c9a8ec8694035b649e

  • SHA256

    9e3dd3a62a1612774cfcbf5354a5e33f4e2db403428401075eed1dae0d6d7f8d

  • SHA512

    6792a9f17e8079e6c87a6b200e99a9495c62769fd67b5f639ceab9fc638926c5bf02d9eadd5053688241ad2a0b59007eaa8891ea85a95ca7fb869ac514a1a080

  • SSDEEP

    98304:vdlcvscDQH7Z2sQ/6vRPSxU07Ps0p/3sRRrw5vsFFjG3x:Dt1+yFSOMN/cRRMUFFj

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\GV_Loader (2).exe
    "C:\Users\Admin\AppData\Local\Temp\GV_Loader (2).exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:576

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/576-0-0x000001B43EB10000-0x000001B43EEC8000-memory.dmp

          Filesize

          3.7MB

        • memory/576-1-0x00007FFAE2BD0000-0x00007FFAE3692000-memory.dmp

          Filesize

          10.8MB

        • memory/576-2-0x000001B43F2F0000-0x000001B43F300000-memory.dmp

          Filesize

          64KB

        • memory/576-3-0x000001B4594E0000-0x000001B4597D8000-memory.dmp

          Filesize

          3.0MB

        • memory/576-4-0x000001B43F320000-0x000001B43F332000-memory.dmp

          Filesize

          72KB

        • memory/576-5-0x000001B4597E0000-0x000001B4599F6000-memory.dmp

          Filesize

          2.1MB

        • memory/576-6-0x000001B440D80000-0x000001B440DBC000-memory.dmp

          Filesize

          240KB

        • memory/576-7-0x000001B43F2F0000-0x000001B43F300000-memory.dmp

          Filesize

          64KB

        • memory/576-8-0x000001B43F2F0000-0x000001B43F300000-memory.dmp

          Filesize

          64KB

        • memory/576-9-0x00007FFAE2BD0000-0x00007FFAE3692000-memory.dmp

          Filesize

          10.8MB

        • memory/576-10-0x000001B43F2F0000-0x000001B43F300000-memory.dmp

          Filesize

          64KB

        • memory/576-12-0x000001B43F2F0000-0x000001B43F300000-memory.dmp

          Filesize

          64KB

        • memory/576-11-0x000001B43F2F0000-0x000001B43F300000-memory.dmp

          Filesize

          64KB