Analysis

  • max time kernel
    131s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-05-2024 00:01

General

  • Target

    FiveM.exe

  • Size

    3.2MB

  • MD5

    a82b4aff87a79462a3461477b51a07cc

  • SHA1

    f74ffc6b7330a9c577baf18e5e7e98c403525d4e

  • SHA256

    ce2b3865a3f79eefe609d721833ae04b061d6f058dcee701dd33b4e292eeddc4

  • SHA512

    5c33a126b704906370a23142942a6d7c6395a8b82e2f79a09700390e68b24fe81be5c10565a1638388a4eca15ddcd4eba6a3e8d15f664cf243bfc9adb0078389

  • SSDEEP

    98304:vYvdT61FCZIT4bNJFY3OqtY+KH4kpc+DX/0H9:vY1T6yZjBHYbKYODW

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FiveM.exe
    "C:\Users\Admin\AppData\Local\Temp\FiveM.exe"
    1⤵
    • Enumerates system info in registry
    PID:4964
  • C:\Windows\System32\GameBarPresenceWriter.exe
    "C:\Windows\System32\GameBarPresenceWriter.exe" -ServerName:Windows.Gaming.GameBar.Internal.PresenceWriterServer
    1⤵
      PID:1356
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4964-0-0x000000007537E000-0x000000007537F000-memory.dmp

      Filesize

      4KB

    • memory/4964-1-0x00000000002F0000-0x0000000000632000-memory.dmp

      Filesize

      3.3MB

    • memory/4964-2-0x0000000005880000-0x0000000005E24000-memory.dmp

      Filesize

      5.6MB

    • memory/4964-3-0x0000000005010000-0x00000000050A2000-memory.dmp

      Filesize

      584KB

    • memory/4964-4-0x00000000051D0000-0x00000000051DA000-memory.dmp

      Filesize

      40KB

    • memory/4964-5-0x0000000075370000-0x0000000075B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4964-6-0x00000000055C0000-0x00000000057D4000-memory.dmp

      Filesize

      2.1MB

    • memory/4964-7-0x0000000005E30000-0x0000000006236000-memory.dmp

      Filesize

      4.0MB

    • memory/4964-8-0x0000000075370000-0x0000000075B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4964-9-0x000000007537E000-0x000000007537F000-memory.dmp

      Filesize

      4KB

    • memory/4964-10-0x0000000075370000-0x0000000075B20000-memory.dmp

      Filesize

      7.7MB

    • memory/4964-11-0x0000000075370000-0x0000000075B20000-memory.dmp

      Filesize

      7.7MB