Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
42s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
13/09/2022, 04:34
Static task
static1
Behavioral task
behavioral1
Sample
PO_CIQ11485900.js
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
PO_CIQ11485900.js
Resource
win10v2004-20220812-en
General
-
Target
PO_CIQ11485900.js
-
Size
381KB
-
MD5
26a330f2d227cabe5d33dc5c5c2c5430
-
SHA1
3f8504c75dda59e419ee563a36deffc7f4a87889
-
SHA256
71c0614a096ad6fe9b4022f8c829467762a05655c769797f9649e254f1531b53
-
SHA512
c003642fc898b95454fa279c0177ac8df34a4d7be9d7688eb335b3ef9d1455a62c882eae224429713bf2d45c18d4a52d4033c3daa11ed1222767b08d04ed3ba5
-
SSDEEP
6144:A3IG6rAFpGR4r4A/TWW73xdxKhzdVkz9NUOW6baLbbe4pMuh:AIrAfwu4A/S+xdxfrU9bR
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
%2B - Port:
21 - Username:
application/x-www-form-urlencoded - Password:
image/jpg
p=
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 1 IoCs
pid Process 1480 jncj4.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jncj4.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jncj4.exe Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jncj4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1480 jncj4.exe 1480 jncj4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1480 jncj4.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 900 wrote to memory of 1952 900 wscript.exe 27 PID 900 wrote to memory of 1952 900 wscript.exe 27 PID 900 wrote to memory of 1952 900 wscript.exe 27 PID 900 wrote to memory of 1480 900 wscript.exe 28 PID 900 wrote to memory of 1480 900 wscript.exe 28 PID 900 wrote to memory of 1480 900 wscript.exe 28 PID 900 wrote to memory of 1480 900 wscript.exe 28 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jncj4.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 jncj4.exe
Processes
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO_CIQ11485900.js1⤵
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\NWYGqtQQxH.js"2⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\jncj4.exe"C:\Users\Admin\AppData\Local\Temp\jncj4.exe"2⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1480
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD56647991a50f3159b6d38f6a992a9ba34
SHA18c2a431cd014ae113e0792f3cd04d0451c3d933a
SHA2561c39e846a626c770e3ebcc97397271407d7f7f619c6d1b4cb55df63222165729
SHA51249fd8580186ee246c2ac7e8e7bc2dd81892fb26e34f623b93e86b19c658c7797ecb0c497e83797abf410e7255a39cfe5cd7989a236aefd6866e258e4a1ae53fc
-
Filesize
209KB
MD56647991a50f3159b6d38f6a992a9ba34
SHA18c2a431cd014ae113e0792f3cd04d0451c3d933a
SHA2561c39e846a626c770e3ebcc97397271407d7f7f619c6d1b4cb55df63222165729
SHA51249fd8580186ee246c2ac7e8e7bc2dd81892fb26e34f623b93e86b19c658c7797ecb0c497e83797abf410e7255a39cfe5cd7989a236aefd6866e258e4a1ae53fc
-
Filesize
2KB
MD5dafd2a6b835f404afd6b7ca0b8ae18d9
SHA12edaf274a1e27a6767b217f5e618eac1eac26509
SHA256ffc555408f652687d48007f27ff07bc13681a9a5f0770f9b4936246b35f4cfab
SHA512a1ba5cab35d99a55638fa4f407ef114a553753bc77aeceaa43dce80ba16f6148c39acf1c860ca4380f975125415245cf1298e59b43cf4dcaf0db47e19cc0a307