Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    135s
  • max time network
    49s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    08/07/2020, 13:01 UTC

General

  • Target

    Q0001DA Payment.exe

  • Size

    672KB

  • MD5

    f9f3d9e01d4a743db0da14e09a1ee59d

  • SHA1

    749b3c58319f90bacd3f8dd3c032d7f53a78c346

  • SHA256

    43e8641205d2a76869199f8b5cf7cbba0533aee5b84c4ccd786ed32f79c9e01c

  • SHA512

    8be9b4cf8e406b8b56abdf2effb3f0f41e0ce8b9a2a74fdfeb84de6e1a04ffd8ce4823511f2082fc3b165c475dcd5f1044c520badaadd3dc8cb340e479ec99ac

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.yandex.ru
  • Port:
    587
  • Username:
    hendrick.jorgen@yandex.ru
  • Password:
    Mix2lower12?..

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla Payload 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops startup file 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Q0001DA Payment.exe
    "C:\Users\Admin\AppData\Local\Temp\Q0001DA Payment.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Windows\SysWOW64\notepad.exe
      "C:\Windows\system32\notepad.exe"
      2⤵
      • Drops startup file
      PID:868
    • C:\Users\Admin\AppData\Local\Temp\Q0001DA Payment.exe
      "C:\Users\Admin\AppData\Local\Temp\Q0001DA Payment.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:988

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/988-1-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/988-3-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/988-4-0x0000000000400000-0x00000000004A5000-memory.dmp

    Filesize

    660KB

  • memory/988-5-0x00000000009B0000-0x00000000009FC000-memory.dmp

    Filesize

    304KB

  • memory/988-6-0x0000000000642000-0x0000000000643000-memory.dmp

    Filesize

    4KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.