Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/10/2022, 00:18

General

  • Target

    TT WIRE COPY.exe

  • Size

    685KB

  • MD5

    34c88e0d3c2e27e5c6440279e8be4ebd

  • SHA1

    7ee5871462fbb1cf9933413f90905fab9138d12c

  • SHA256

    b414908f25be67f292fa2f37e6fa4350cb931d70820f794bf037b38bd21c8a1c

  • SHA512

    4379d8a0575e3e7d092e1060370a60e60615334659ff2fecc4ca39eaa7e86974b2599f519a00ab370c83a7a5c4d1f321af9ec37b96700b40e0722b6df9c8526e

  • SSDEEP

    12288:y50u9/A7rvX2wRhGdAzClJXB/i0hYYwCTnyM2C:yodREJBYiTJ

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    mail.southernboilers.org
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Sksmoke2018#

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TT WIRE COPY.exe
    "C:\Users\Admin\AppData\Local\Temp\TT WIRE COPY.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1084
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\xLLXbNrI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEA16.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2752
    • C:\Users\Admin\AppData\Local\Temp\TT WIRE COPY.exe
      "{path}"
      2⤵
        PID:3720
      • C:\Users\Admin\AppData\Local\Temp\TT WIRE COPY.exe
        "{path}"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2108

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpEA16.tmp

      Filesize

      1KB

      MD5

      46a62643c241ec83337c28cd0c9bf3bf

      SHA1

      7806c1f89dcf09bc3a52cf239fa7247ca8015a75

      SHA256

      e593533888e0dd6814035583e4b9b77ae51315176d3c68c8e84884e7ebe20c04

      SHA512

      69a4a011150b9af8db41920282243bc5eec91aac877e22aa615082755bb7a78fc1827e7e6966a16bb7600b18c78cd3738b0871e3b27c4c8cd43be4334099b98f

    • memory/1084-132-0x0000000000E80000-0x0000000000F30000-memory.dmp

      Filesize

      704KB

    • memory/1084-133-0x0000000005EB0000-0x0000000006454000-memory.dmp

      Filesize

      5.6MB

    • memory/1084-134-0x0000000005900000-0x0000000005992000-memory.dmp

      Filesize

      584KB

    • memory/1084-135-0x00000000059A0000-0x0000000005A3C000-memory.dmp

      Filesize

      624KB

    • memory/1084-136-0x00000000058C0000-0x00000000058CA000-memory.dmp

      Filesize

      40KB

    • memory/2108-141-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/2108-142-0x0000000006490000-0x00000000064F6000-memory.dmp

      Filesize

      408KB

    • memory/2108-143-0x0000000006BB0000-0x0000000006C00000-memory.dmp

      Filesize

      320KB