Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
102s -
max time network
116s -
platform
windows10_x64 -
resource
win10 -
submitted
07/07/2020, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
FedEx tracking details..exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
FedEx tracking details..exe
Resource
win10
General
-
Target
FedEx tracking details..exe
-
Size
464KB
-
MD5
5b28351f030733c6103afbc44ebdc875
-
SHA1
44588c6bd3cfe7b466be5e93b32da4f56efd86dd
-
SHA256
977ce0ef145f86fe87581278a8ee9f9d177dcb42c55cd070215d347c3240a596
-
SHA512
31f6135f24370761f239c051b025cfccc73f9400000536e86c8e918a83ce1174fa234e071b0031a602d72197865316cfa5725f5cb03f22fd56f78e2433916bb8
Malware Config
Extracted
Protocol: smtp- Host:
smtp.waltartosto.com - Port:
587 - Username:
[email protected] - Password:
eukwE%p8
Signatures
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 PID 3588 wrote to memory of 4000 3588 FedEx tracking details..exe 67 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3588 set thread context of 4000 3588 FedEx tracking details..exe 67 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3588 FedEx tracking details..exe Token: SeDebugPrivilege 4000 FedEx tracking details..exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3588 FedEx tracking details..exe 4000 FedEx tracking details..exe 4000 FedEx tracking details..exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\FedEx tracking details..exe"C:\Users\Admin\AppData\Local\Temp\FedEx tracking details..exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\FedEx tracking details..exe"{path}"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:4000
-