Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 01:24
Behavioral task
behavioral1
Sample
9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe
Resource
win7-20240903-en
General
-
Target
9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe
-
Size
957KB
-
MD5
2956335e57afbde716244bdaa7c45033
-
SHA1
fbbd9e2fa72719f9b25b8f32c903e0e72e99ba22
-
SHA256
9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c
-
SHA512
4d50f08bf34c03fd0e1205a30cf73d67c7fff122db830eb058f4dd99a8d6f2c6e7b2037de903370e738efeab949460e112b21ba8f731978548497c3594f02007
-
SSDEEP
12288:T5I0wXiC25YyzNfeO4ha9pTpDXSu3LfH30xXgD6cFYKdD:VVxyab1DCkowD6cTD
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral1/memory/1924-2-0x00000000005D0000-0x00000000005E4000-memory.dmp agile_net -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1924 9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1924 9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe"C:\Users\Admin\AppData\Local\Temp\9ef0a3f0a89be11e59c11db39461d53197ae207049e15a29b9544959f3dbc44c.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924