Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
84s -
max time network
64s -
platform
windows7_x64 -
resource
win7 -
submitted
07/07/2020, 08:25
Static task
static1
Behavioral task
behavioral1
Sample
RFQ # 097663899.exe
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
RFQ # 097663899.exe
Resource
win10
0 signatures
0 seconds
General
-
Target
RFQ # 097663899.exe
-
Size
517KB
-
MD5
c95c87c201c9378e1d9adb7037d2b7e7
-
SHA1
ff1f4a1123609ea18e9c65a5b36a4e536b40ae6a
-
SHA256
b9a6dd35f9ca163d4e76a25d642ca7a580272ea7886a6a639273ac5b732e9f8c
-
SHA512
b54ecc0039f89171dc059a007190125365c7aa08cea2e4f049d30993000ea81e6c3efb01c9880153b3b67e557090024b1fac8d7e5ee4e7dc1d7577a60a289b0a
Malware Config
Extracted
Family
agenttesla
Credentials
Protocol: smtp- Host:
mail.pptoursperu.com - Port:
587 - Username:
[email protected] - Password:
mailppt2019-
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 4 IoCs
resource yara_rule behavioral1/memory/1040-3-0x000000000044735E-mapping.dmp family_agenttesla behavioral1/memory/1040-2-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/1040-4-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla behavioral1/memory/1040-5-0x0000000000400000-0x0000000000450000-memory.dmp family_agenttesla -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\CpSnJ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\CpSnJ\\CpSnJ.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1584 set thread context of 1040 1584 RFQ # 097663899.exe 24 -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1620 REG.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1040 RegSvcs.exe 1040 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1040 RegSvcs.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1584 wrote to memory of 1040 1584 RFQ # 097663899.exe 24 PID 1040 wrote to memory of 1620 1040 RegSvcs.exe 28 PID 1040 wrote to memory of 1620 1040 RegSvcs.exe 28 PID 1040 wrote to memory of 1620 1040 RegSvcs.exe 28 PID 1040 wrote to memory of 1620 1040 RegSvcs.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ # 097663899.exe"C:\Users\Admin\AppData\Local\Temp\RFQ # 097663899.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\REG.exeREG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System / v DisableTaskMgr / t REG_DWORD / d 1 / f3⤵
- Modifies registry key
PID:1620
-
-