Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
131s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23/12/2022, 04:27
Static task
static1
Behavioral task
behavioral1
Sample
DHL shipment details.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
DHL shipment details.exe
Resource
win10v2004-20220812-en
General
-
Target
DHL shipment details.exe
-
Size
875KB
-
MD5
393672bb42bc083ac95b87dfb7747b8c
-
SHA1
8f843f8f0853dce4d9dde38e26a677886c0180b0
-
SHA256
5c860ed368d528130c6e7e0349659248bd2ed17831b72725f23a41363c802606
-
SHA512
207c41933c6ea35685218e0cce37c05e398349f2efe124cfd070b69dc9a4edb10340998e1487129d35c0af7db0fd315b9dc198b1537acc3173913daa1882ce0b
-
SSDEEP
24576:o+H80Dr5z8em/TkTWG23DOghM1CcsfJx9:TJ8b/QTfkDOk7Jx
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
graceofgod@amenn
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/5104-143-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation DHL shipment details.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1492 set thread context of 5104 1492 DHL shipment details.exe 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4956 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3296 powershell.exe 5104 RegSvcs.exe 5104 RegSvcs.exe 3296 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3296 powershell.exe Token: SeDebugPrivilege 5104 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5104 RegSvcs.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3296 1492 DHL shipment details.exe 88 PID 1492 wrote to memory of 3296 1492 DHL shipment details.exe 88 PID 1492 wrote to memory of 3296 1492 DHL shipment details.exe 88 PID 1492 wrote to memory of 4956 1492 DHL shipment details.exe 90 PID 1492 wrote to memory of 4956 1492 DHL shipment details.exe 90 PID 1492 wrote to memory of 4956 1492 DHL shipment details.exe 90 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 PID 1492 wrote to memory of 5104 1492 DHL shipment details.exe 92 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL shipment details.exe"C:\Users\Admin\AppData\Local\Temp\DHL shipment details.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BLnbPbmJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BLnbPbmJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1FDC.tmp"2⤵
- Creates scheduled task(s)
PID:4956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:5104
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c39897e7fbcec357a168d2bd421c324d
SHA168fdce35b234cc3af4a266cefbaabeb3848212b1
SHA2560be2caab1e01a3e447cf0eda37eab9f5e22370ad0ba538b2e5c56514c3967cb2
SHA512ddb0b97e0653e5920990ff35788999becf9a6d746d0f91b59ef1e9beadb45581dc0e589c6ff3e630e672e146a53e2d9b099c4dcf2fb40c54b5c10557d441d0d2