Analysis
-
max time kernel
1442s -
max time network
1443s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
Installer 1.3.exe
Resource
win7-20240708-en
General
-
Target
Installer 1.3.exe
-
Size
1.5MB
-
MD5
06efc7d8ce754e5a2ad836be4b373fb4
-
SHA1
882f13dfe59d5a20c0ee8388cfd591726ca988d6
-
SHA256
deb4f878c419cecd80faad4758cf7f879859f678bd01f211b9ca8d54f7f6bd9b
-
SHA512
5d48d38ae49a6143710977da8d433e1221dee1449d1cbe2bd78b33707cb7dc63cefd9384a1a94da030ca4d696967420ab9fff22b9a1824e48e1be431f5a55d8f
-
SSDEEP
49152:1kQTAD4O1QzsbkNMx7Ch6w3UdeMbtiqxruPTXB/j2:1aDLQIbPw6w3Gjbtiqpu92
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2908-2134-0x0000000005A00000-0x0000000005C12000-memory.dmp family_agenttesla -
.NET Reactor proctector 35 IoCs
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
resource yara_rule behavioral1/memory/2908-1-0x0000000004D80000-0x0000000004F1A000-memory.dmp net_reactor behavioral1/memory/2908-3-0x0000000004BE0000-0x0000000004D76000-memory.dmp net_reactor behavioral1/memory/2908-7-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-15-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-25-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-37-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-47-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-61-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-6-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-68-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-65-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-63-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-59-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-57-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-55-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-53-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-51-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-50-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-45-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-43-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-41-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-39-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-35-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-33-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-31-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-29-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-27-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-23-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-21-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-19-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-17-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-13-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-11-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-9-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor behavioral1/memory/2908-70-0x0000000004BE0000-0x0000000004D72000-memory.dmp net_reactor -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Installer 1.3.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Installer 1.3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Installer 1.3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Installer 1.3.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2908 Installer 1.3.exe