Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
89s -
max time network
52s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23/12/2022, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
DHL shipment details.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DHL shipment details.exe
Resource
win10v2004-20220812-en
General
-
Target
DHL shipment details.exe
-
Size
875KB
-
MD5
393672bb42bc083ac95b87dfb7747b8c
-
SHA1
8f843f8f0853dce4d9dde38e26a677886c0180b0
-
SHA256
5c860ed368d528130c6e7e0349659248bd2ed17831b72725f23a41363c802606
-
SHA512
207c41933c6ea35685218e0cce37c05e398349f2efe124cfd070b69dc9a4edb10340998e1487129d35c0af7db0fd315b9dc198b1537acc3173913daa1882ce0b
-
SSDEEP
24576:o+H80Dr5z8em/TkTWG23DOghM1CcsfJx9:TJ8b/QTfkDOk7Jx
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
graceofgod@amenn
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 6 IoCs
resource yara_rule behavioral1/memory/320-67-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/320-68-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/320-69-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/320-70-0x000000000043761E-mapping.dmp family_agenttesla behavioral1/memory/320-72-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/320-74-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1536 set thread context of 320 1536 DHL shipment details.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 320 RegSvcs.exe 320 RegSvcs.exe 1280 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 320 RegSvcs.exe Token: SeDebugPrivilege 1280 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1536 wrote to memory of 1280 1536 DHL shipment details.exe 26 PID 1536 wrote to memory of 1280 1536 DHL shipment details.exe 26 PID 1536 wrote to memory of 1280 1536 DHL shipment details.exe 26 PID 1536 wrote to memory of 1280 1536 DHL shipment details.exe 26 PID 1536 wrote to memory of 592 1536 DHL shipment details.exe 28 PID 1536 wrote to memory of 592 1536 DHL shipment details.exe 28 PID 1536 wrote to memory of 592 1536 DHL shipment details.exe 28 PID 1536 wrote to memory of 592 1536 DHL shipment details.exe 28 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30 PID 1536 wrote to memory of 320 1536 DHL shipment details.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL shipment details.exe"C:\Users\Admin\AppData\Local\Temp\DHL shipment details.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLnbPbmJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1280
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLnbPbmJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCF70.tmp"2⤵
- Creates scheduled task(s)
PID:592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD513cb6f16d9fd4f3ec2c97ebc0173faa4
SHA16f84d51ab669014c4b6d2bd59e9f6c42c4abb2c0
SHA25690951221dae35e9d7ad0ef288000665ec3adc6daf733ee672d0c20b9edc71866
SHA512a2145511451afd9e017b8adffe62e55964291a481a911f8d209b4a575810e7769867c73b570d4ce9e0bf77969121aa0eae01be88925cad92753ae38166637da5