Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 22:54
Behavioral task
behavioral1
Sample
Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
WindowsFormsApp1.exe
Resource
win7-20240708-en
General
-
Target
WindowsFormsApp1.exe
-
Size
11KB
-
MD5
16bb8fd62f616a36dc0a653d041ce0c9
-
SHA1
031a4dcda582a3c07ac97432e782e1d9737bb8b6
-
SHA256
75cc29fea492a6d0cc0d88e2b92ee0cd0e13724b7179a538e33f7e624b8fb756
-
SHA512
539c1ad0bc02519f3e62edb98476a02bbb660bcdc990e9cf31d9c189568b7717221a5191ed19a295ed0efceceae537297ef80b908d938b6efab0fe995bc952c4
-
SSDEEP
192:q1zGA5NR2Ipg3EyAU9hWLPZELSoKmD5DVL3LKLrVq5bectpJVAcIfMU9Rz:qNR2Ipg3mWwLOL5KmD5DVL3LKLrkacty
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral3/memory/2276-2-0x0000000004EA0000-0x00000000050B4000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsFormsApp1.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS WindowsFormsApp1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer WindowsFormsApp1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion WindowsFormsApp1.exe