Analysis
-
max time kernel
24s -
max time network
20s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
13-09-2024 04:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
TEAM X CORP.exe
Resource
win11-20240802-en
windows11-21h2-x64
4 signatures
150 seconds
General
-
Target
TEAM X CORP.exe
-
Size
2.2MB
-
MD5
1db09b03e94046548ace9cf3964a9371
-
SHA1
31da76b0241995af29469f745efb47ef94a62089
-
SHA256
94d1afe65287cd6df12c9b6d33f9db3cab419ebc6155b0734e11a856ea2307a0
-
SHA512
319099cdab506afd89b6071ee6b300e13ad016d69e53e6278deb36c5deda6f626cc5bd89badbad70c59bfcd54af83a6683d0f982e912259b5fa8c6bf9032076f
-
SSDEEP
49152:LnKoAjys7tNQJ/W2nVcITYbNbNWo4kSH3OqtwIn:LOjysHjDIT4bNJFY3OqtD
Score
10/10
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/3420-3-0x00000236D94D0000-0x00000236D96E4000-memory.dmp family_agenttesla -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS TEAM X CORP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer TEAM X CORP.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion TEAM X CORP.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3420 TEAM X CORP.exe