Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2022, 08:56
Static task
static1
Behavioral task
behavioral1
Sample
68Kp5nmURb71iQp.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
68Kp5nmURb71iQp.exe
Resource
win10v2004-20220812-en
General
-
Target
68Kp5nmURb71iQp.exe
-
Size
575KB
-
MD5
dbcafe45f06421e025fdd3367effe582
-
SHA1
e671d4cef56da8b9c5813b60bc9ec4bf9d3cea4a
-
SHA256
c17be8e772c880d5909d7b6eeeeb9c2f20fead98a67826598c56e00c6e3bdcd5
-
SHA512
a81a95725fbc86517ab42f5fb92f8b0da9d847aa4901c0eabaa9f3432723f8c3791f1b0f2ed839a32975eefd715c4f21c3f9559387caa3f233cfc34037367b2d
-
SSDEEP
12288:iNVw6FnoCM2qTzHcdfSFUEOA/99TZE8D8ITDBMszcXCJ:kqhvHckFU/WE8oI
Malware Config
Extracted
Protocol: smtp- Host:
host12.registrar-servers.com - Port:
587 - Username:
[email protected] - Password:
paymentsuccessful@2022
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 68Kp5nmURb71iQp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation 68Kp5nmURb71iQp.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 68Kp5nmURb71iQp.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 68Kp5nmURb71iQp.exe Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 68Kp5nmURb71iQp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4868 set thread context of 5044 4868 68Kp5nmURb71iQp.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 756 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4868 68Kp5nmURb71iQp.exe 5044 68Kp5nmURb71iQp.exe 5044 68Kp5nmURb71iQp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4868 68Kp5nmURb71iQp.exe Token: SeDebugPrivilege 5044 68Kp5nmURb71iQp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4868 68Kp5nmURb71iQp.exe 4868 68Kp5nmURb71iQp.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4868 wrote to memory of 756 4868 68Kp5nmURb71iQp.exe 93 PID 4868 wrote to memory of 756 4868 68Kp5nmURb71iQp.exe 93 PID 4868 wrote to memory of 756 4868 68Kp5nmURb71iQp.exe 93 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 PID 4868 wrote to memory of 5044 4868 68Kp5nmURb71iQp.exe 95 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 68Kp5nmURb71iQp.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 68Kp5nmURb71iQp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\68Kp5nmURb71iQp.exe"C:\Users\Admin\AppData\Local\Temp\68Kp5nmURb71iQp.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UjYrOnlknajYWA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6D6F.tmp"2⤵
- Creates scheduled task(s)
PID:756
-
-
C:\Users\Admin\AppData\Local\Temp\68Kp5nmURb71iQp.exe"{path}"2⤵
- Drops file in Drivers directory
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:5044
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5e24674741b0c5a9997d3114d9a90e1e3
SHA1e5e1a9cdf39707c6ec1fd97128fa9709593b979a
SHA256e86698f36e6fd814b0777f14912c9888adcdb41c9b39147a4593ddaf9092b01c
SHA51249e3337bbfda5fabe72e3625a2790d96ac34da291860e30fb7b1b35a0844a329e2faa742d5bd962a89ee453a761c757abc5e7b8904c2f1211fbe08ba8c84847b