Analysis
-
max time kernel
11s -
max time network
12s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-09-2024 12:54
Static task
static1
1 signatures
General
-
Target
Primordial.exe
-
Size
5.8MB
-
MD5
1dcc77148be400ddac7152c745ce2957
-
SHA1
7a7d0d1194b8663c33620769b6f8c1705667d66b
-
SHA256
87b2d1f81317a320bc41ebe9cee0f6b1d9e6bf158d429fe0188a0d66b4e43421
-
SHA512
5eefc0a326ca9c3530488f0aa9754046206f15b4196e2b6f6f2adda1fe9f02fa117372cbf106e42f9aa4276c8f8f68c5824660784778add0b5b304e2c0b4d38c
-
SSDEEP
98304:ZiKscnNZkbxF2JPKavhVt4GviWHAT4iKscnNZkbxFM7K5JEyUa:w6LOIK+1iWHI76LOUKHEyU
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/4864-4-0x0000000005D80000-0x0000000005F92000-memory.dmp family_agenttesla -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Primordial.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Primordial.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Primordial.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Primordial.exe