Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
110s -
platform
windows10_x64 -
resource
win10 -
submitted
08/07/2020, 06:45
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER PO.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
NEW ORDER PO.exe
Resource
win10
General
-
Target
NEW ORDER PO.exe
-
Size
868KB
-
MD5
ab04941625f1d72409d14bcca23d9e18
-
SHA1
febaa8d9f809d338ea3a6c6d2ea78db78721fef7
-
SHA256
9617f8a2e320e9d614aef640a76c405df8a6266a30bc9deb3601391082304ae4
-
SHA512
7ea84b7d47849aabadced0818a9dc7715c3fed1be824dbb7599e05dfe7bb6e5f8f4afa84f1846048fe8c4ce5a04666e132af382ae78068b5c2db180704d61b3a
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
wRwswHW2
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla Payload 2 IoCs
resource yara_rule behavioral2/memory/3972-1-0x0000000000447AAE-mapping.dmp family_agenttesla behavioral2/memory/3972-0-0x0000000000400000-0x000000000044C000-memory.dmp family_agenttesla -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 api.ipify.org 7 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3176 set thread context of 3972 3176 NEW ORDER PO.exe 67 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3972 NEW ORDER PO.exe 3972 NEW ORDER PO.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3972 NEW ORDER PO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3972 NEW ORDER PO.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67 PID 3176 wrote to memory of 3972 3176 NEW ORDER PO.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER PO.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER PO.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER PO.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
PID:3972
-