Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
81s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 12:51
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA INVOICE.IMG.exe
Resource
win7
Behavioral task
behavioral2
Sample
PROFORMA INVOICE.IMG.exe
Resource
win10v200430
General
-
Target
PROFORMA INVOICE.IMG.exe
-
Size
419KB
-
MD5
6bff3690d22a457b26479cead0c41893
-
SHA1
f5b064200c67ea1db1c90d6facd020137435b4c9
-
SHA256
1b96f8cd03f8c2920ec5ea6e1ea5402968e7a148da59e38991890eefbe76a19d
-
SHA512
e9dfb157b78b437610e2bc9e9f8fc9d45e199bec3323b221233c98fafc65a4764088fc263a700767bd85e96e312afc2f86e6ed4738c507a4c990218dac3840bc
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
kingmoney12345
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/memory/2540-0-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla behavioral2/memory/2540-1-0x000000000044701E-mapping.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4024 set thread context of 2540 4024 PROFORMA INVOICE.IMG.exe 72 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2540 PROFORMA INVOICE.IMG.exe 2540 PROFORMA INVOICE.IMG.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2540 PROFORMA INVOICE.IMG.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2540 PROFORMA INVOICE.IMG.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72 PID 4024 wrote to memory of 2540 4024 PROFORMA INVOICE.IMG.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.IMG.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.IMG.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE.IMG.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2540
-