Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    42s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13/09/2022, 04:34

General

  • Target

    PO_CIQ11485900.js

  • Size

    381KB

  • MD5

    26a330f2d227cabe5d33dc5c5c2c5430

  • SHA1

    3f8504c75dda59e419ee563a36deffc7f4a87889

  • SHA256

    71c0614a096ad6fe9b4022f8c829467762a05655c769797f9649e254f1531b53

  • SHA512

    c003642fc898b95454fa279c0177ac8df34a4d7be9d7688eb335b3ef9d1455a62c882eae224429713bf2d45c18d4a52d4033c3daa11ed1222767b08d04ed3ba5

  • SSDEEP

    6144:A3IG6rAFpGR4r4A/TWW73xdxKhzdVkz9NUOW6baLbbe4pMuh:AIrAfwu4A/S+xdxfrU9bR

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    %2B
  • Port:
    21
  • Username:
    application/x-www-form-urlencoded
  • Password:
    image/jpg
C2

p=

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\PO_CIQ11485900.js
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:900
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\NWYGqtQQxH.js"
      2⤵
        PID:1952
      • C:\Users\Admin\AppData\Local\Temp\jncj4.exe
        "C:\Users\Admin\AppData\Local\Temp\jncj4.exe"
        2⤵
        • Executes dropped EXE
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:1480

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\jncj4.exe

      Filesize

      209KB

      MD5

      6647991a50f3159b6d38f6a992a9ba34

      SHA1

      8c2a431cd014ae113e0792f3cd04d0451c3d933a

      SHA256

      1c39e846a626c770e3ebcc97397271407d7f7f619c6d1b4cb55df63222165729

      SHA512

      49fd8580186ee246c2ac7e8e7bc2dd81892fb26e34f623b93e86b19c658c7797ecb0c497e83797abf410e7255a39cfe5cd7989a236aefd6866e258e4a1ae53fc

    • C:\Users\Admin\AppData\Local\Temp\jncj4.exe

      Filesize

      209KB

      MD5

      6647991a50f3159b6d38f6a992a9ba34

      SHA1

      8c2a431cd014ae113e0792f3cd04d0451c3d933a

      SHA256

      1c39e846a626c770e3ebcc97397271407d7f7f619c6d1b4cb55df63222165729

      SHA512

      49fd8580186ee246c2ac7e8e7bc2dd81892fb26e34f623b93e86b19c658c7797ecb0c497e83797abf410e7255a39cfe5cd7989a236aefd6866e258e4a1ae53fc

    • C:\Users\Admin\AppData\Roaming\NWYGqtQQxH.js

      Filesize

      2KB

      MD5

      dafd2a6b835f404afd6b7ca0b8ae18d9

      SHA1

      2edaf274a1e27a6767b217f5e618eac1eac26509

      SHA256

      ffc555408f652687d48007f27ff07bc13681a9a5f0770f9b4936246b35f4cfab

      SHA512

      a1ba5cab35d99a55638fa4f407ef114a553753bc77aeceaa43dce80ba16f6148c39acf1c860ca4380f975125415245cf1298e59b43cf4dcaf0db47e19cc0a307

    • memory/900-54-0x000007FEFBD81000-0x000007FEFBD83000-memory.dmp

      Filesize

      8KB

    • memory/1480-60-0x0000000000D60000-0x0000000000D9A000-memory.dmp

      Filesize

      232KB

    • memory/1480-61-0x0000000076121000-0x0000000076123000-memory.dmp

      Filesize

      8KB