Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
85s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11/10/2022, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENTTRF889020022.exe
Resource
win7-20220812-en
General
-
Target
PAYMENTTRF889020022.exe
-
Size
355KB
-
MD5
1d00728cbb02b69a8cad3f032be410c8
-
SHA1
a803d959e77cdbec645288fe922d12e6888a209a
-
SHA256
c3fb8b20af40e3a6905a1190d657bd725c241efa3d91d0c0e1546f2b8ae8a2ff
-
SHA512
8858475d2f17f2f6786cbcd33f64bcb1515c931fd095d7d1828b1765dca3d47e454ef961c3ce4e41c9087494530694ede7475c8f31d4d549a9b2d913cc5d7257
-
SSDEEP
6144:HNeZmLE2rXehVTdEMLjtEkzKJg5/mnc52iOu0anAU5hvrBAVGFryDgvMar819nYk:HNl9KhVTtLjmkzufc5D0aBvrXVkgzr85
Malware Config
Extracted
Protocol: ftp- Host:
ftp.collinssaludnatural.com - Port:
21 - Username:
[email protected] - Password:
1Hhzqx^s+8Oe
Extracted
nanocore
1.2.2.0
37.0.14.210:6060
127.0.0.1:6060
9fc6520a-b866-467e-b702-7533f9b56460
-
activate_away_mode
true
-
backup_connection_host
127.0.0.1
-
backup_dns_server
8.8.4.4
-
buffer_size
65535
-
build_time
2022-04-25T14:53:00.256026436Z
-
bypass_user_account_control
true
- bypass_user_account_control_data
-
clear_access_control
true
-
clear_zone_identifier
false
-
connect_delay
4000
-
connection_port
6060
-
default_group
SWIFT
-
enable_debug_mode
true
-
gc_threshold
1.048576e+07
-
keep_alive_timeout
30000
-
keyboard_logging
false
-
lan_timeout
2500
-
max_packet_size
1.048576e+07
-
mutex
9fc6520a-b866-467e-b702-7533f9b56460
-
mutex_timeout
5000
-
prevent_system_sleep
false
-
primary_connection_host
37.0.14.210
-
primary_dns_server
8.8.8.8
-
request_elevation
true
-
restart_delay
5000
-
run_delay
0
-
run_on_startup
true
-
set_critical_process
true
-
timeout_interval
5000
-
use_custom_dns_server
false
-
version
1.2.2.0
-
wan_timeout
8000
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.collinssaludnatural.com/ - Port:
21 - Username:
[email protected] - Password:
1Hhzqx^s+8Oe
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 3 IoCs
pid Process 1512 bglfezp.exe 1744 bglfezp.exe 1032 cargo bin stub.exe -
Loads dropped DLL 5 IoCs
pid Process 1192 PAYMENTTRF889020022.exe 1512 bglfezp.exe 1512 bglfezp.exe 944 bglfezp.exe 944 bglfezp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cargo bin stub.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cargo bin stub.exe Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cargo bin stub.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bglfezp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1512 set thread context of 944 1512 bglfezp.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 944 bglfezp.exe 944 bglfezp.exe 944 bglfezp.exe 944 bglfezp.exe 1032 cargo bin stub.exe 1032 cargo bin stub.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 944 bglfezp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 944 bglfezp.exe Token: SeDebugPrivilege 1032 cargo bin stub.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1192 wrote to memory of 1512 1192 PAYMENTTRF889020022.exe 27 PID 1192 wrote to memory of 1512 1192 PAYMENTTRF889020022.exe 27 PID 1192 wrote to memory of 1512 1192 PAYMENTTRF889020022.exe 27 PID 1192 wrote to memory of 1512 1192 PAYMENTTRF889020022.exe 27 PID 1512 wrote to memory of 1744 1512 bglfezp.exe 28 PID 1512 wrote to memory of 1744 1512 bglfezp.exe 28 PID 1512 wrote to memory of 1744 1512 bglfezp.exe 28 PID 1512 wrote to memory of 1744 1512 bglfezp.exe 28 PID 1512 wrote to memory of 944 1512 bglfezp.exe 29 PID 1512 wrote to memory of 944 1512 bglfezp.exe 29 PID 1512 wrote to memory of 944 1512 bglfezp.exe 29 PID 1512 wrote to memory of 944 1512 bglfezp.exe 29 PID 1512 wrote to memory of 944 1512 bglfezp.exe 29 PID 944 wrote to memory of 1032 944 bglfezp.exe 30 PID 944 wrote to memory of 1032 944 bglfezp.exe 30 PID 944 wrote to memory of 1032 944 bglfezp.exe 30 PID 944 wrote to memory of 1032 944 bglfezp.exe 30 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cargo bin stub.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 cargo bin stub.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENTTRF889020022.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENTTRF889020022.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"3⤵
- Executes dropped EXE
PID:1744
-
-
C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"C:\Users\Admin\AppData\Local\Temp\bglfezp.exe"3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\cargo bin stub.exe"C:\Users\Admin\AppData\Local\Temp\cargo bin stub.exe"4⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1032
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
208KB
MD58c84f344dc0e2d2d9280b5530fea429f
SHA10827eee176132340f3b537b90317938390f1e40e
SHA256e041425918d874f81b89564074230c8dbb66d66a40e2f5cef1df119cfde1db5a
SHA512574018df4b43d00173d4088d8707627f738c2205b0da21f63f7a51705f9983eda66dcc4272b388f7545bc7222411a3a65b21acd595071a80f116b2384a5761f2
-
Filesize
208KB
MD58c84f344dc0e2d2d9280b5530fea429f
SHA10827eee176132340f3b537b90317938390f1e40e
SHA256e041425918d874f81b89564074230c8dbb66d66a40e2f5cef1df119cfde1db5a
SHA512574018df4b43d00173d4088d8707627f738c2205b0da21f63f7a51705f9983eda66dcc4272b388f7545bc7222411a3a65b21acd595071a80f116b2384a5761f2
-
Filesize
280KB
MD54fa4f199d63df6ed8ab5185bd28acef5
SHA18021bc2518851cd10202c3923a6de177c830d09f
SHA25603062221476d82fd59234117006236c4d88bc247c5b38894393c28caba795399
SHA51284d2a9021282d702cc951819c886c6dd8db4cad2ae8b5a3b609c64af6a1e2b5c3643c68e3bcad7a49db8a364e83626ea5867614e81c45e37fcc3be511e06f30a
-
Filesize
4KB
MD51a8c85947e15b903b353a69704452e22
SHA193941b1e770b673698b1ae338156d16257d94db4
SHA25606f20357f36314fb82d550011bdbbdef7e9ce4ceac791c133e537cafe3b62c83
SHA512b9ae1d779e8e2ff999073477765df2bf665219e670d250727c6177de039ff7cef800f9590084dd5d1d1bc02cad3895ea9e9f2b6068229a755ef8609e3e022318
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
125KB
MD58dca1faf45a7de90e2a67b3c724d9c14
SHA1a48123b3a5e70f484566e55d92f2772e34393b92
SHA2560b0f985c493696c622017a28c979417c5be084d91b7976eab2397e9ac5bbfeb8
SHA512b54f138c7e432ea1ef14f8594a5e379f703d88d63d9ce69b2415cf88fb7cdea657e5a3b3d57bb2bfda0fc24c730cedc4dbe789a5b3e1b2089fa7b32807ea6d3b
-
Filesize
208KB
MD58c84f344dc0e2d2d9280b5530fea429f
SHA10827eee176132340f3b537b90317938390f1e40e
SHA256e041425918d874f81b89564074230c8dbb66d66a40e2f5cef1df119cfde1db5a
SHA512574018df4b43d00173d4088d8707627f738c2205b0da21f63f7a51705f9983eda66dcc4272b388f7545bc7222411a3a65b21acd595071a80f116b2384a5761f2