Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
04-09-2024 22:59
Behavioral task
behavioral1
Sample
Guna.UI2.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Guna.UI2.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Spoofer Source.exe
Resource
win7-20240708-en
General
-
Target
Spoofer Source.exe
-
Size
400KB
-
MD5
33ca7f9336469266f0c015e6e48daa46
-
SHA1
12e1cb4de5bd69235b5bff14ce4f7f347c6188e9
-
SHA256
706563ac4e3e3ebced44a80c0998de1fca1a602e598d2648e3e1094805cf7555
-
SHA512
ca8523ee29069143c4de271eb2ef99b30b4c12ffc9a1b8ea3be2d5a9db439770a8dd4acc96036f0f0c36a59ed516675c5a1bc360112e96e9da56d571a0bbecc9
-
SSDEEP
6144:Deg1iF+DLYUdM1/6AQF1wJb8BFJBxFPystpsYnWVoesoej9dhZsENKhG3:Deg1s+u/FQFWbm1ysfsskkxdRKh
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral3/memory/2960-2-0x0000000004D80000-0x0000000004F94000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Spoofer Source.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Spoofer Source.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Spoofer Source.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Spoofer Source.exe