Analysis
-
max time kernel
17s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 11:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
BP.EXE.exe
Resource
win7-20240708-en
4 signatures
60 seconds
Behavioral task
behavioral2
Sample
BP.EXE.exe
Resource
win10v2004-20240802-en
10 signatures
60 seconds
General
-
Target
BP.EXE.exe
-
Size
13.6MB
-
MD5
dce661efa069bfbf7b70e7a6f927b8f4
-
SHA1
1221de2e1f9f6653fa3749926b1c73a843023008
-
SHA256
65b2832bac6da6228a0be5aea2b0475a2ef6d5acc69cda2cc4bf3a5e71f0c003
-
SHA512
fbd426547e00210bbd640610c51d8b9f5cc1ed3d991127852d363f774beb000ec013456b35cacc33718edd7ee410d7c9c7f2b8809f3eb864305e58226b6d291c
-
SSDEEP
393216:/ugGaO9ugGaOkugGaO9rJYcAh+/oOV5s4rJYcAh+/oOV5sfAEyrkS9Ed5L1n:/ugGaO9ugGaOkugGaO9wU/Vjs4wU/Vje
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/2552-2-0x000000001D1D0000-0x000000001D3E2000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS BP.EXE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer BP.EXE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion BP.EXE.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1636 2552 BP.EXE.exe 30 PID 2552 wrote to memory of 1636 2552 BP.EXE.exe 30 PID 2552 wrote to memory of 1636 2552 BP.EXE.exe 30