Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
purchase order.exe
-
Size
482KB
-
Sample
200707-6kh8ac55x6
-
MD5
cc8dd999e2986f15641dfad4362cf2a7
-
SHA1
abeb848ddcfba06a03ba90f4c55e28c56e47494c
-
SHA256
b6eecf6385766748acdbd8b0b350d9344f775495a0ca62a1dcca578d2b6100ca
-
SHA512
e43349ee45e8bed299a1cdbd0485f454f3c2dcc4f795e788541dc47860dda859584d34baef4306f4140783f9f39b6e6cb6f42da47e99428168511a0d59c147c0
Static task
static1
Behavioral task
behavioral1
Sample
purchase order.exe
Resource
win7v200430
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.pierreinsurancebrokers.com - Port:
587 - Username:
[email protected] - Password:
advisor@1234
Extracted
Protocol: smtp- Host:
mail.pierreinsurancebrokers.com - Port:
587 - Username:
[email protected] - Password:
advisor@1234
Targets
-
-
Target
purchase order.exe
-
Size
482KB
-
MD5
cc8dd999e2986f15641dfad4362cf2a7
-
SHA1
abeb848ddcfba06a03ba90f4c55e28c56e47494c
-
SHA256
b6eecf6385766748acdbd8b0b350d9344f775495a0ca62a1dcca578d2b6100ca
-
SHA512
e43349ee45e8bed299a1cdbd0485f454f3c2dcc4f795e788541dc47860dda859584d34baef4306f4140783f9f39b6e6cb6f42da47e99428168511a0d59c147c0
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload
-
Looks for VirtualBox Guest Additions in registry
-
Looks for VMWare Tools registry key
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Suspicious use of SetThreadContext
-