Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    90s
  • max time network
    131s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2022, 09:55

General

  • Target

    Porformant Invoice.exe

  • Size

    958KB

  • MD5

    49b19764de980c5cafc0618081f76d82

  • SHA1

    326e54e1c873f42ee4b580fbbd768066840c1489

  • SHA256

    65a4a789f106ee9731dfa6e4afe2f09b4db15170c6d925332dd20f97d1fbdf2c

  • SHA512

    ac70a9c81b997612aef3a41b28bc8c93cb3968f32ebda05c804ba9dc222e4130cafd48a2b2898b99fb1d6fb0f1a55751458bbbb3ebdc90d95d667655c1c7c9a3

  • SSDEEP

    12288:J2iNsJ2uuJTgnbfybNhOIlCJPqGhiqBtfA3CE385Qo1nhsd:J1TpTgnOhIJ36CR5/1S

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5573921253:AAHXKq7lrmioCzUGP-9p7lopfbVX0A_ZdQA/sendDocument

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Porformant Invoice.exe
    "C:\Users\Admin\AppData\Local\Temp\Porformant Invoice.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4664
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TBHdXbkgfCN.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2208
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TBHdXbkgfCN" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5302.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2804
    • C:\Users\Admin\AppData\Local\Temp\Porformant Invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\Porformant Invoice.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3904

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Porformant Invoice.exe.log

    Filesize

    1KB

    MD5

    e08f822522c617a40840c62e4b0fb45e

    SHA1

    ae516dca4da5234be6676d3f234c19ec55725be7

    SHA256

    bd9d5e9f7fe6fcff17d873555d4077d15f7d6cdda1183e7f7d278b735ffe1fd7

    SHA512

    894a7fb7bbc18ac6ba13378f58a7db80ad00d6080be9a66b01cae8e23e41d9d2d4cd53c1e20669356b73590c8a3ebfda4bdda3258f81240db56c4a81b7313fe4

  • C:\Users\Admin\AppData\Local\Temp\tmp5302.tmp

    Filesize

    1KB

    MD5

    0161e5a72ad12a136fb08ea0cfb0d5aa

    SHA1

    32b7aeb4ab737d7d80ce3696ae5490e77a2935c5

    SHA256

    535825c1c748470a78f26e4df20cf90406e3e7302995e958f6ca2adf079526b3

    SHA512

    b10d28daeda464a055bc74a9950d30d2fcaceeadb52de710d55bc15df7e40628621f40f7f1e8f3fac254dfdff25e115b8b3175c448c9ec14fdb1d3f9c862cc45

  • memory/2208-153-0x0000000007290000-0x00000000072AA000-memory.dmp

    Filesize

    104KB

  • memory/2208-148-0x0000000005F80000-0x0000000005F9E000-memory.dmp

    Filesize

    120KB

  • memory/2208-159-0x00000000075B0000-0x00000000075B8000-memory.dmp

    Filesize

    32KB

  • memory/2208-158-0x00000000075D0000-0x00000000075EA000-memory.dmp

    Filesize

    104KB

  • memory/2208-150-0x0000000070BF0000-0x0000000070C3C000-memory.dmp

    Filesize

    304KB

  • memory/2208-140-0x00000000025E0000-0x0000000002616000-memory.dmp

    Filesize

    216KB

  • memory/2208-146-0x0000000004E40000-0x0000000004E62000-memory.dmp

    Filesize

    136KB

  • memory/2208-142-0x0000000005120000-0x0000000005748000-memory.dmp

    Filesize

    6.2MB

  • memory/2208-154-0x0000000007300000-0x000000000730A000-memory.dmp

    Filesize

    40KB

  • memory/2208-155-0x0000000007510000-0x00000000075A6000-memory.dmp

    Filesize

    600KB

  • memory/2208-157-0x00000000074C0000-0x00000000074CE000-memory.dmp

    Filesize

    56KB

  • memory/2208-147-0x0000000004FE0000-0x0000000005046000-memory.dmp

    Filesize

    408KB

  • memory/2208-151-0x0000000006520000-0x000000000653E000-memory.dmp

    Filesize

    120KB

  • memory/2208-152-0x00000000078D0000-0x0000000007F4A000-memory.dmp

    Filesize

    6.5MB

  • memory/2208-149-0x0000000006F40000-0x0000000006F72000-memory.dmp

    Filesize

    200KB

  • memory/3904-156-0x0000000006B70000-0x0000000006BC0000-memory.dmp

    Filesize

    320KB

  • memory/3904-144-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/4664-134-0x00000000052E0000-0x0000000005372000-memory.dmp

    Filesize

    584KB

  • memory/4664-132-0x0000000000870000-0x0000000000966000-memory.dmp

    Filesize

    984KB

  • memory/4664-135-0x0000000005390000-0x000000000539A000-memory.dmp

    Filesize

    40KB

  • memory/4664-133-0x0000000005990000-0x0000000005F34000-memory.dmp

    Filesize

    5.6MB

  • memory/4664-137-0x000000000A9D0000-0x000000000AA36000-memory.dmp

    Filesize

    408KB

  • memory/4664-136-0x000000000A5A0000-0x000000000A63C000-memory.dmp

    Filesize

    624KB