Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-07-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe
Resource
win10v2004-20240709-en
General
-
Target
501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe
-
Size
12.4MB
-
MD5
e775c62b365b7ac9dc5e08bf5b9cd8c8
-
SHA1
473de4bb746349a0830688002f2b021e430f00f5
-
SHA256
501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45
-
SHA512
149d2b0859531ba51f3d21cb02502ee9585e673b359f623a8aacbec82abb5ef332fc4290337733e98b5d18644444fb80b6b0f94f1191d9adb4c05263744acc51
-
SSDEEP
98304:i3kZIT4bNJFY3Oqt/h+KH4kpc+DX/0H4feb5:i3kZjBHYYKYODJeb
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2644-3-0x000000001BDC0000-0x000000001BFD4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe 2644 501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe"C:\Users\Admin\AppData\Local\Temp\501a13ccee44a504c9b38c502cc7e14c8792673182a5d46575a7c6b181e4df45.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2644