Analysis

  • max time kernel
    17s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    07-09-2024 14:23

General

  • Target

    Enthapy.exe

  • Size

    3.5MB

  • MD5

    d71930c5e91a5e39b3645629b2ec11e9

  • SHA1

    cb4d9d7dc4bddfedb85df5f3985786c88ea3dfb9

  • SHA256

    c2bb9fa0dc16902993052818ec6267d78edda1fa3d484603fc66625da5666fd0

  • SHA512

    5852b03559b1d4feaccb90d27904f209a1c92a819763d177fb88b67b8abd4cfbd59d3e80e2d5d560addde850710515e1fb01a41ed35db528e0c538efe5829fda

  • SSDEEP

    98304:y1RvSndGBWsFcYQVArv4MnBpVgNhVRw+GI6:QRKdzUJQVArvb3gRRw+C

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Enthapy.exe
    "C:\Users\Admin\AppData\Local\Temp\Enthapy.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2xlYLXM0NJdSO4Bsp

    Filesize

    154KB

    MD5

    093ee89be9ede30383f39a899c485a82

    SHA1

    fdd3002e7d814ee47c1c1b8487c72c6bbb3a2d00

    SHA256

    707fdc5c8bab57a90061c6a8ed7b70d5ffb82fc810e994e79f90bace890c255a

    SHA512

    4be480df0b639750483eb09229b4edcfdcd16141eb95d92a3f28a13bf737146d7cc5db6ad03a5cde258f71b589e5310b6d9bc1563ac7b1d40408eea236d96f4b

  • memory/4000-14-0x000001CBCEAC0000-0x000001CBCEAD2000-memory.dmp

    Filesize

    72KB

  • memory/4000-7-0x000001CBCE1E0000-0x000001CBCE3D6000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-16-0x000001CBCEC90000-0x000001CBCEC98000-memory.dmp

    Filesize

    32KB

  • memory/4000-8-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-9-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-10-0x000001CBCE570000-0x000001CBCE580000-memory.dmp

    Filesize

    64KB

  • memory/4000-11-0x000001CBCEAE0000-0x000001CBCEAFA000-memory.dmp

    Filesize

    104KB

  • memory/4000-12-0x000001CBCE580000-0x000001CBCE58A000-memory.dmp

    Filesize

    40KB

  • memory/4000-17-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-1-0x000001CBB31D0000-0x000001CBB3556000-memory.dmp

    Filesize

    3.5MB

  • memory/4000-27-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-6-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-13-0x000001CBCEB00000-0x000001CBCEB26000-memory.dmp

    Filesize

    152KB

  • memory/4000-18-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-19-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-20-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-21-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-22-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-23-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-24-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-0-0x00007FFA5FB20000-0x00007FFA5FD29000-memory.dmp

    Filesize

    2.0MB

  • memory/4000-15-0x000001CBCEB30000-0x000001CBCEB38000-memory.dmp

    Filesize

    32KB