Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/12/2022, 14:34

221227-rxqn8afa54 10

27/12/2022, 14:34

221227-rxfh9afa52 10

25/12/2022, 11:46

221225-nxcwksee8w 10

Analysis

  • max time kernel
    58s
  • max time network
    72s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/12/2022, 14:34

General

  • Target

    1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe

  • Size

    1.0MB

  • MD5

    1a5e881a5197cdee0fd2be1af368198a

  • SHA1

    3ff94ebf7ed66aadafa66b28f01f3a4beeadb98c

  • SHA256

    1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2

  • SHA512

    8c75be3273a8d8b1043e3e4e2034cd00a8bb33c404ae2441619e16113b24723159a46a6fce4526ae31040e1bd3ee7368340ad7bbbb2fe4d0c9d15d78fdc4ffb2

  • SSDEEP

    12288:attzg2iNNvemxU2Uy49rF+mu3bk0RqV4Ef3JdselFDnw7Vu:QBg1vxUWcIrk0Rqf3Jd1FLIV

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5618720367:AAFqeS2K5cBYFRaIBpS6oi_RaSYSI0_A__w/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
    "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
      "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
      2⤵
        PID:3020
      • C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
        "C:\Users\Admin\AppData\Local\Temp\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:3004

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe.log

      Filesize

      1KB

      MD5

      12557ab909651a6f99d3503d614d3562

      SHA1

      b86745768059a514bea3a438e1e96086af463246

      SHA256

      9589c869703e95d40d5870c60f66d8460f7914e9fe8dd579533c84148112babd

      SHA512

      10cdb2fa7cf054af937b4aeddfe16fe755d6b09db5a51f7052adbf472b4b435e16c141f3712762f3b67f990c3efcfa47659576988e321214c747d6cd98e75521

    • memory/2172-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-153-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-154-0x0000000000D50000-0x0000000000E5C000-memory.dmp

      Filesize

      1.0MB

    • memory/2172-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-158-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-157-0x0000000005C40000-0x000000000613E000-memory.dmp

      Filesize

      5.0MB

    • memory/2172-159-0x0000000005740000-0x00000000057D2000-memory.dmp

      Filesize

      584KB

    • memory/2172-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-161-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-174-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-175-0x0000000005670000-0x000000000567A000-memory.dmp

      Filesize

      40KB

    • memory/2172-176-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-178-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-181-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-183-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/2172-184-0x0000000005AD0000-0x0000000005AE8000-memory.dmp

      Filesize

      96KB

    • memory/2172-185-0x0000000005AF0000-0x0000000005AFC000-memory.dmp

      Filesize

      48KB

    • memory/2172-186-0x000000000A3B0000-0x000000000A444000-memory.dmp

      Filesize

      592KB

    • memory/2172-187-0x000000000A4E0000-0x000000000A57C000-memory.dmp

      Filesize

      624KB

    • memory/2172-188-0x000000000A5F0000-0x000000000A656000-memory.dmp

      Filesize

      408KB

    • memory/2172-189-0x000000000A480000-0x000000000A4BA000-memory.dmp

      Filesize

      232KB

    • memory/2172-190-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/3004-191-0x0000000000400000-0x000000000043A000-memory.dmp

      Filesize

      232KB

    • memory/3004-193-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/3004-194-0x00000000779B0000-0x0000000077B3E000-memory.dmp

      Filesize

      1.6MB

    • memory/3004-252-0x0000000005F20000-0x0000000005F38000-memory.dmp

      Filesize

      96KB