Analysis
-
max time kernel
146s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05-03-2024 06:53
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
p.exe
Resource
win7-20240221-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
p.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
p.exe
-
Size
1.0MB
-
MD5
5245bda7f8a56fd15c2974d4c35262a4
-
SHA1
32b0dd0d781643925b19dc57e06f6169ba6b67be
-
SHA256
e2c3d4137136fe107e4b38629a0323ee423de66368ebcf3a2c4b4b4eb3e61818
-
SHA512
b984602e8db49c9ff0eca737d04e0e9d87ab956f7d58c30d268d3d1a202bac14bccec165bca35a362a0cb6e63dd31ee06a1577cdb1652bb28bed9b9a8bdb62d7
-
SSDEEP
24576:dqRaPITMvRFhRRbNWoCfkYSEH3OqtwIuXoU:MAPITYbNbNWo4kSH3OqtwIU
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4452-3-0x0000029535400000-0x0000029535614000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer p.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion p.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 4452 p.exe 4452 p.exe 4452 p.exe 4452 p.exe 4452 p.exe 4452 p.exe 4452 p.exe 4452 p.exe 4452 p.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4452 p.exe