Analysis
-
max time kernel
17s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
07-09-2024 14:23
Static task
static1
Behavioral task
behavioral1
Sample
Enthapy.exe
Resource
win11-20240802-en
General
-
Target
Enthapy.exe
-
Size
3.5MB
-
MD5
d71930c5e91a5e39b3645629b2ec11e9
-
SHA1
cb4d9d7dc4bddfedb85df5f3985786c88ea3dfb9
-
SHA256
c2bb9fa0dc16902993052818ec6267d78edda1fa3d484603fc66625da5666fd0
-
SHA512
5852b03559b1d4feaccb90d27904f209a1c92a819763d177fb88b67b8abd4cfbd59d3e80e2d5d560addde850710515e1fb01a41ed35db528e0c538efe5829fda
-
SSDEEP
98304:y1RvSndGBWsFcYQVArv4MnBpVgNhVRw+GI6:QRKdzUJQVArvb3gRRw+C
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/4000-7-0x000001CBCE1E0000-0x000001CBCE3D6000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Enthapy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Enthapy.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Enthapy.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4000 Enthapy.exe 4000 Enthapy.exe 4000 Enthapy.exe 4000 Enthapy.exe 4000 Enthapy.exe 4000 Enthapy.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4000 Enthapy.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154KB
MD5093ee89be9ede30383f39a899c485a82
SHA1fdd3002e7d814ee47c1c1b8487c72c6bbb3a2d00
SHA256707fdc5c8bab57a90061c6a8ed7b70d5ffb82fc810e994e79f90bace890c255a
SHA5124be480df0b639750483eb09229b4edcfdcd16141eb95d92a3f28a13bf737146d7cc5db6ad03a5cde258f71b589e5310b6d9bc1563ac7b1d40408eea236d96f4b