Analysis

  • max time kernel
    17s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29/08/2024, 11:48

General

  • Target

    BP.EXE.exe

  • Size

    13.6MB

  • MD5

    dce661efa069bfbf7b70e7a6f927b8f4

  • SHA1

    1221de2e1f9f6653fa3749926b1c73a843023008

  • SHA256

    65b2832bac6da6228a0be5aea2b0475a2ef6d5acc69cda2cc4bf3a5e71f0c003

  • SHA512

    fbd426547e00210bbd640610c51d8b9f5cc1ed3d991127852d363f774beb000ec013456b35cacc33718edd7ee410d7c9c7f2b8809f3eb864305e58226b6d291c

  • SSDEEP

    393216:/ugGaO9ugGaOkugGaO9rJYcAh+/oOV5s4rJYcAh+/oOV5sfAEyrkS9Ed5L1n:/ugGaO9ugGaOkugGaO9wU/Vjs4wU/Vje

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BP.EXE.exe
    "C:\Users\Admin\AppData\Local\Temp\BP.EXE.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 2552 -s 660
      2⤵
        PID:1636

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2552-0-0x000007FEF6113000-0x000007FEF6114000-memory.dmp

      Filesize

      4KB

    • memory/2552-1-0x0000000000AA0000-0x0000000001832000-memory.dmp

      Filesize

      13.6MB

    • memory/2552-2-0x000000001D1D0000-0x000000001D3E2000-memory.dmp

      Filesize

      2.1MB

    • memory/2552-3-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

      Filesize

      9.9MB

    • memory/2552-4-0x000007FEF6110000-0x000007FEF6AFC000-memory.dmp

      Filesize

      9.9MB