Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
11c15539131...b2.exe
windows7-x64
11c15539131...b2.exe
windows10-1703-x64
101c15539131...b2.exe
windows10-2004-x64
10FedEx EL18...00.exe
windows7-x64
10FedEx EL18...00.exe
windows10-1703-x64
10FedEx EL18...00.exe
windows10-2004-x64
10HSBC_Swift...df.exe
windows7-x64
10HSBC_Swift...df.exe
windows10-1703-x64
10HSBC_Swift...df.exe
windows10-2004-x64
10Halkbank_E...68.exe
windows7-x64
10Halkbank_E...68.exe
windows10-1703-x64
10Halkbank_E...68.exe
windows10-2004-x64
10SecuriteIn...75.exe
windows7-x64
10SecuriteIn...75.exe
windows10-1703-x64
10SecuriteIn...75.exe
windows10-2004-x64
10epTZLp5PyVs2lsz.exe
windows7-x64
10epTZLp5PyVs2lsz.exe
windows10-1703-x64
10epTZLp5PyVs2lsz.exe
windows10-2004-x64
10f227b51c63...cc.exe
windows7-x64
10f227b51c63...cc.exe
windows10-1703-x64
10f227b51c63...cc.exe
windows10-2004-x64
10f2335865a4...a3.exe
windows7-x64
10f2335865a4...a3.exe
windows10-1703-x64
10f2335865a4...a3.exe
windows10-2004-x64
10Resubmissions
27/12/2022, 14:34
221227-rxqn8afa54 1027/12/2022, 14:34
221227-rxfh9afa52 1025/12/2022, 11:46
221225-nxcwksee8w 10Analysis
-
max time kernel
36s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/12/2022, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
FedEx EL1870335D online Customer AWB Shipping Advisory AWB Docs.Commercial Invoice. Packing List. Bill of Landing CMS00.exe
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
FedEx EL1870335D online Customer AWB Shipping Advisory AWB Docs.Commercial Invoice. Packing List. Bill of Landing CMS00.exe
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
FedEx EL1870335D online Customer AWB Shipping Advisory AWB Docs.Commercial Invoice. Packing List. Bill of Landing CMS00.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
HSBC_Swift_Copy.pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
HSBC_Swift_Copy.pdf.exe
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
HSBC_Swift_Copy.pdf.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral10
Sample
Halkbank_Ekstre_20221222_114527_468568.exe
Resource
win7-20221111-en
Behavioral task
behavioral11
Sample
Halkbank_Ekstre_20221222_114527_468568.exe
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
Halkbank_Ekstre_20221222_114527_468568.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
SecuriteInfo.com.Win64.RATX-gen.30948.8275.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
SecuriteInfo.com.Win64.RATX-gen.30948.8275.exe
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
SecuriteInfo.com.Win64.RATX-gen.30948.8275.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral16
Sample
epTZLp5PyVs2lsz.exe
Resource
win7-20220901-en
Behavioral task
behavioral17
Sample
epTZLp5PyVs2lsz.exe
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
epTZLp5PyVs2lsz.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
f227b51c6347b3acf53b8e54e84864c2c3e4ef973226bc517f0f9852dbc1bfcc.exe
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
f227b51c6347b3acf53b8e54e84864c2c3e4ef973226bc517f0f9852dbc1bfcc.exe
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
f227b51c6347b3acf53b8e54e84864c2c3e4ef973226bc517f0f9852dbc1bfcc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral22
Sample
f2335865a426507b47ecf5e37dcae9a3.exe
Resource
win7-20220901-en
Behavioral task
behavioral23
Sample
f2335865a426507b47ecf5e37dcae9a3.exe
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
f2335865a426507b47ecf5e37dcae9a3.exe
Resource
win10v2004-20220812-en
General
-
Target
Halkbank_Ekstre_20221222_114527_468568.exe
-
Size
497KB
-
MD5
447d145276eef872ff7ff17aece82184
-
SHA1
770464513653a17210806339a7bd5f51a761f355
-
SHA256
a4e9eafd0bfcb5db60683b2c37e4a113087a656408b96e2795f94af8aecc20b2
-
SHA512
cfeee165c61a2a62f13611d7cad57c8bdc9ebe441718953394cf3e200398a5ebb71ffaf7cc427981105f65c3e6fe23d021d32713ce70a76c80e9296fb3572fbf
-
SSDEEP
6144:ckwKLoJOtJrEx6csI6PVmWVc9fXEna+sSJSYRf7P1cZGllQYbT:7LosV0/3WVc98a+bJLf7PeZG7/
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5932499274:AAFVgY_mSAbCu0fXfBWMuUmyk56JtTf6--Q/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 1768 bulgqhwm.exe 904 bulgqhwm.exe -
Loads dropped DLL 3 IoCs
pid Process 1148 Halkbank_Ekstre_20221222_114527_468568.exe 1148 Halkbank_Ekstre_20221222_114527_468568.exe 1768 bulgqhwm.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bulgqhwm.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bulgqhwm.exe Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bulgqhwm.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\qcdeuwwekoehj = "C:\\Users\\Admin\\AppData\\Roaming\\strr\\uyanejxgv.exe \"C:\\Users\\Admin\\AppData\\Local\\Temp\\bulgqhwm.exe\" C:\\Users\\Admin\\AppData\\Local\\Te" bulgqhwm.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\GsHLJkZ = "C:\\Users\\Admin\\AppData\\Roaming\\GsHLJkZ\\GsHLJkZ.exe" bulgqhwm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1768 set thread context of 904 1768 bulgqhwm.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 904 bulgqhwm.exe 904 bulgqhwm.exe 904 bulgqhwm.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1768 bulgqhwm.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 904 bulgqhwm.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1768 1148 Halkbank_Ekstre_20221222_114527_468568.exe 28 PID 1148 wrote to memory of 1768 1148 Halkbank_Ekstre_20221222_114527_468568.exe 28 PID 1148 wrote to memory of 1768 1148 Halkbank_Ekstre_20221222_114527_468568.exe 28 PID 1148 wrote to memory of 1768 1148 Halkbank_Ekstre_20221222_114527_468568.exe 28 PID 1768 wrote to memory of 904 1768 bulgqhwm.exe 29 PID 1768 wrote to memory of 904 1768 bulgqhwm.exe 29 PID 1768 wrote to memory of 904 1768 bulgqhwm.exe 29 PID 1768 wrote to memory of 904 1768 bulgqhwm.exe 29 PID 1768 wrote to memory of 904 1768 bulgqhwm.exe 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bulgqhwm.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 bulgqhwm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20221222_114527_468568.exe"C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20221222_114527_468568.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\bulgqhwm.exe"C:\Users\Admin\AppData\Local\Temp\bulgqhwm.exe" C:\Users\Admin\AppData\Local\Temp\snbijh.j2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\bulgqhwm.exe"C:\Users\Admin\AppData\Local\Temp\bulgqhwm.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:904
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5f88682efc9a0c67e9d473ac16382a464
SHA1fa590240915943be5549e4a7d367c6e7feae0950
SHA2568a1605166fe27bc789442fac3ccd1520c6f7ec4e66249ff3ed38e9d836ba29bb
SHA512f8cdce3bbd7fcfa973e3463cf2cf70b9b4ff529739231c768331bcba4da926ca79d06b206bda964031e334f6dba96eb3d1e03215a0499f0e8be7dd602a5566fd
-
Filesize
104KB
MD5f88682efc9a0c67e9d473ac16382a464
SHA1fa590240915943be5549e4a7d367c6e7feae0950
SHA2568a1605166fe27bc789442fac3ccd1520c6f7ec4e66249ff3ed38e9d836ba29bb
SHA512f8cdce3bbd7fcfa973e3463cf2cf70b9b4ff529739231c768331bcba4da926ca79d06b206bda964031e334f6dba96eb3d1e03215a0499f0e8be7dd602a5566fd
-
Filesize
104KB
MD5f88682efc9a0c67e9d473ac16382a464
SHA1fa590240915943be5549e4a7d367c6e7feae0950
SHA2568a1605166fe27bc789442fac3ccd1520c6f7ec4e66249ff3ed38e9d836ba29bb
SHA512f8cdce3bbd7fcfa973e3463cf2cf70b9b4ff529739231c768331bcba4da926ca79d06b206bda964031e334f6dba96eb3d1e03215a0499f0e8be7dd602a5566fd
-
Filesize
7KB
MD54ca7058a1cb0f1a0bd6aab41ec0dc9f6
SHA14fa464e69cf5cc8fc0ffef5ba9d8e45e476b60c5
SHA256cdf3aa29316dc7ced98954ea61ca9414842b4d0fb7b7860fbd3f546142222c41
SHA5129ab5437f072b564844be4354a0d5575532a9fb99af5971f2cbd9b420152ba969345a3dcac8f66ee1088e304c379586a9a7f43d71e91f8d4252d0fbdb8769aa48
-
Filesize
239KB
MD5d1ed56c72fb93c4334099d3cd6118782
SHA1f042aad8470cb2883f3bd4e5edfb8a29f84b2a18
SHA25633f527a2157556410261da0eda583a090df6e152b9dfb612d2a9abe0d0ef0c38
SHA512403595f905049674681f7c6f92a83517288a23fa14d3760af2c797998e24c23c275d90871c19624c4563dcbd8e1a445c42a5fd6bd56ebb114e74a644eb8de212
-
Filesize
104KB
MD5f88682efc9a0c67e9d473ac16382a464
SHA1fa590240915943be5549e4a7d367c6e7feae0950
SHA2568a1605166fe27bc789442fac3ccd1520c6f7ec4e66249ff3ed38e9d836ba29bb
SHA512f8cdce3bbd7fcfa973e3463cf2cf70b9b4ff529739231c768331bcba4da926ca79d06b206bda964031e334f6dba96eb3d1e03215a0499f0e8be7dd602a5566fd
-
Filesize
104KB
MD5f88682efc9a0c67e9d473ac16382a464
SHA1fa590240915943be5549e4a7d367c6e7feae0950
SHA2568a1605166fe27bc789442fac3ccd1520c6f7ec4e66249ff3ed38e9d836ba29bb
SHA512f8cdce3bbd7fcfa973e3463cf2cf70b9b4ff529739231c768331bcba4da926ca79d06b206bda964031e334f6dba96eb3d1e03215a0499f0e8be7dd602a5566fd
-
Filesize
104KB
MD5f88682efc9a0c67e9d473ac16382a464
SHA1fa590240915943be5549e4a7d367c6e7feae0950
SHA2568a1605166fe27bc789442fac3ccd1520c6f7ec4e66249ff3ed38e9d836ba29bb
SHA512f8cdce3bbd7fcfa973e3463cf2cf70b9b4ff529739231c768331bcba4da926ca79d06b206bda964031e334f6dba96eb3d1e03215a0499f0e8be7dd602a5566fd