Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
79s -
max time network
73s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.IMG.exe
Resource
win7
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.IMG.exe
Resource
win10v200430
General
-
Target
PROFORMA INVOICE.IMG.exe
-
Size
419KB
-
MD5
6bff3690d22a457b26479cead0c41893
-
SHA1
f5b064200c67ea1db1c90d6facd020137435b4c9
-
SHA256
1b96f8cd03f8c2920ec5ea6e1ea5402968e7a148da59e38991890eefbe76a19d
-
SHA512
e9dfb157b78b437610e2bc9e9f8fc9d45e199bec3323b221233c98fafc65a4764088fc263a700767bd85e96e312afc2f86e6ed4738c507a4c990218dac3840bc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1600-0-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1600-1-0x000000000044701E-mapping.dmp family_agenttesla behavioral1/memory/1600-2-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral1/memory/1600-3-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 1600 1492 PROFORMA INVOICE.IMG.exe 24 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1600 PROFORMA INVOICE.IMG.exe 1600 PROFORMA INVOICE.IMG.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1600 PROFORMA INVOICE.IMG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1600 PROFORMA INVOICE.IMG.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24 PID 1492 wrote to memory of 1600 1492 PROFORMA INVOICE.IMG.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.IMG.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.IMG.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.IMG.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1600
-