Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23/10/2024, 15:08

General

  • Target

    agentesla/0a9e668b23fdd273acb8ac8096e435e09f581d67203cf2475ef6f90e6b0965e2.exe

  • Size

    237KB

  • MD5

    4f9ade14f96d7c93f918682e5edb11fe

  • SHA1

    6955a5974802c075aacefd6836e73cd1b68a02e4

  • SHA256

    0a9e668b23fdd273acb8ac8096e435e09f581d67203cf2475ef6f90e6b0965e2

  • SHA512

    9729c9a162815f923f902f8edbd270d6b9e66409e6fa76eab7bbb8e581b7c6bf44f8898485f48a578dcd44c7259be2855ccab45475b55468668bf504a9aba23c

  • SSDEEP

    3072:eFS5h5B5RGyPBQob8aJPoH0FfIn57N0OUJW:ek5h5B5RTBH4QPoH0FfIX0r

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

Processes

  • C:\Users\Admin\AppData\Local\Temp\agentesla\0a9e668b23fdd273acb8ac8096e435e09f581d67203cf2475ef6f90e6b0965e2.exe
    "C:\Users\Admin\AppData\Local\Temp\agentesla\0a9e668b23fdd273acb8ac8096e435e09f581d67203cf2475ef6f90e6b0965e2.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:2008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2008-0-0x000000007405E000-0x000000007405F000-memory.dmp

    Filesize

    4KB

  • memory/2008-1-0x0000000000910000-0x0000000000952000-memory.dmp

    Filesize

    264KB

  • memory/2008-2-0x0000000074050000-0x000000007473E000-memory.dmp

    Filesize

    6.9MB

  • memory/2008-3-0x000000007405E000-0x000000007405F000-memory.dmp

    Filesize

    4KB

  • memory/2008-4-0x0000000074050000-0x000000007473E000-memory.dmp

    Filesize

    6.9MB