Analysis
-
max time kernel
131s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
16-05-2024 00:01
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
FiveM.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
300 seconds
Behavioral task
behavioral2
Sample
FiveM.exe
Resource
win10v2004-20240426-en
windows10-2004-x64
4 signatures
300 seconds
General
-
Target
FiveM.exe
-
Size
3.2MB
-
MD5
a82b4aff87a79462a3461477b51a07cc
-
SHA1
f74ffc6b7330a9c577baf18e5e7e98c403525d4e
-
SHA256
ce2b3865a3f79eefe609d721833ae04b061d6f058dcee701dd33b4e292eeddc4
-
SHA512
5c33a126b704906370a23142942a6d7c6395a8b82e2f79a09700390e68b24fe81be5c10565a1638388a4eca15ddcd4eba6a3e8d15f664cf243bfc9adb0078389
-
SSDEEP
98304:vYvdT61FCZIT4bNJFY3OqtY+KH4kpc+DX/0H9:vY1T6yZjBHYbKYODW
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/4964-6-0x00000000055C0000-0x00000000057D4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion FiveM.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS FiveM.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer FiveM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1876 OpenWith.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FiveM.exe"C:\Users\Admin\AppData\Local\Temp\FiveM.exe"1⤵
- Enumerates system info in registry
PID:4964
-
C:\Windows\System32\GameBarPresenceWriter.exe"C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer1⤵PID:1356
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:1876