Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
1b3a73040e35a4aad3694d3d036446d3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1b3a73040e35a4aad3694d3d036446d3.exe
Resource
win10v2004-20240226-en
General
-
Target
1b3a73040e35a4aad3694d3d036446d3.exe
-
Size
2.8MB
-
MD5
1b3a73040e35a4aad3694d3d036446d3
-
SHA1
9f64debc8f7fe6ffd922073da0f4ed54139ad9c8
-
SHA256
27641498d9b498595cd6a181370f81b1e3b64d7155ff95f012babf362b60b4e2
-
SHA512
f9e3276149ec2e2084b69464002c3c58d519bd32ac3f012f92cdb310af24a597e69e079d1ccc573437f52ef0ab35b07884316b91f7013060e5695964f14a1fd3
-
SSDEEP
49152:ZIMqVJqJIXxNjdCHoE0exs/fV4BgZ/A/M0rIV2yyX/Nn:Z3PIGoy/BgZ/OR80ySn
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3924-7-0x000001AE68B20000-0x000001AE68D34000-memory.dmp family_agenttesla -
.NET Reactor proctector 1 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
Processes:
resource yara_rule behavioral2/memory/3924-0-0x000001AE4D550000-0x000001AE4D82C000-memory.dmp net_reactor -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
1b3a73040e35a4aad3694d3d036446d3.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 1b3a73040e35a4aad3694d3d036446d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 1b3a73040e35a4aad3694d3d036446d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 1b3a73040e35a4aad3694d3d036446d3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1b3a73040e35a4aad3694d3d036446d3.exedescription pid process Token: SeDebugPrivilege 3924 1b3a73040e35a4aad3694d3d036446d3.exe
Processes
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3924-0-0x000001AE4D550000-0x000001AE4D82C000-memory.dmpFilesize
2.9MB
-
memory/3924-1-0x00007FFF18BF0000-0x00007FFF196B1000-memory.dmpFilesize
10.8MB
-
memory/3924-2-0x000001AE67D20000-0x000001AE67D30000-memory.dmpFilesize
64KB
-
memory/3924-3-0x000001AE67E30000-0x000001AE6808A000-memory.dmpFilesize
2.4MB
-
memory/3924-4-0x000001AE4F400000-0x000001AE4F412000-memory.dmpFilesize
72KB
-
memory/3924-5-0x000001AE67C30000-0x000001AE67C4A000-memory.dmpFilesize
104KB
-
memory/3924-6-0x000001AE67C50000-0x000001AE67C62000-memory.dmpFilesize
72KB
-
memory/3924-7-0x000001AE68B20000-0x000001AE68D34000-memory.dmpFilesize
2.1MB
-
memory/3924-8-0x000001AE67D20000-0x000001AE67D30000-memory.dmpFilesize
64KB
-
memory/3924-9-0x000001AE67D20000-0x000001AE67D30000-memory.dmpFilesize
64KB
-
memory/3924-11-0x000001AE69930000-0x000001AE6996C000-memory.dmpFilesize
240KB
-
memory/3924-13-0x00007FFF18BF0000-0x00007FFF196B1000-memory.dmpFilesize
10.8MB
-
memory/3924-14-0x000001AE67D20000-0x000001AE67D30000-memory.dmpFilesize
64KB
-
memory/3924-15-0x000001AE67D20000-0x000001AE67D30000-memory.dmpFilesize
64KB
-
memory/3924-16-0x000001AE67D20000-0x000001AE67D30000-memory.dmpFilesize
64KB