Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

27/12/2022, 14:34

221227-rxqn8afa54 10

27/12/2022, 14:34

221227-rxfh9afa52 10

25/12/2022, 11:46

221225-nxcwksee8w 10

Analysis

  • max time kernel
    81s
  • max time network
    152s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    27/12/2022, 14:34

General

  • Target

    HSBC_Swift_Copy.pdf.exe

  • Size

    1001KB

  • MD5

    ce3718f0a5cd81530496e4724857b0cb

  • SHA1

    17aca36e82674bd55a48684acc4eef6cd02696b1

  • SHA256

    980572025579ff98c1ab84aa8c0c045e075d174bc5bb166e2694590c98f90a54

  • SHA512

    6f30e90a5b9412a24f9513690cfca60c57f2e615604a12ddb7e355bd80894b7f3a37d8242813c76484a258db588c3df25f193a556284c3408d98c92ae814f724

  • SSDEEP

    12288:bZ+2iN1/Sr+pGrnU9xmh873NdbE9QJKQZdF+LHZnbNFphh26mdOAH8c+9epf+mDG:Q1e+gnU9cOrjEw5Zupbxhh26mlH80q

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3380
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TBcRbJIkEv.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3372
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TBcRbJIkEv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp937.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4852
    • C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
      2⤵
        PID:4620
      • C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:4556

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\HSBC_Swift_Copy.pdf.exe.log

      Filesize

      1KB

      MD5

      0c2899d7c6746f42d5bbe088c777f94c

      SHA1

      622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

      SHA256

      5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

      SHA512

      ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

      Filesize

      2KB

      MD5

      db01a2c1c7e70b2b038edf8ad5ad9826

      SHA1

      540217c647a73bad8d8a79e3a0f3998b5abd199b

      SHA256

      413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

      SHA512

      c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

      Filesize

      18KB

      MD5

      f17e2735bef3dd31f25b6f5325ab1116

      SHA1

      08db1144a8c9c92664a247a48d29a8c18f820c61

      SHA256

      37c750352516d2131fba9c673963004432ccfe475dc5281da7e4ea80637eae57

      SHA512

      4bf4465383d0f9559debfb880de6d93191dac8c7ae34afe8a5e5bafab6712a438449644ed5ae0bf758addb7832e78cc114c1b1d2de034dc1af31eaace2bcd2b5

    • C:\Users\Admin\AppData\Local\Temp\tmp937.tmp

      Filesize

      1KB

      MD5

      46b7a9e1ae34454ec464f76b6c075c39

      SHA1

      e0225ff4c145dd43f1fd09b7c6b09cc8c1244f70

      SHA256

      a8424d8a5ecb0e3e5056c8285c2f1c00004062a83123716dd1a06471d3219bab

      SHA512

      7f7979839693b2733a09d03c973183aafc7461084991e84fa989c1b2b32e3bfe90a6a21a2269890518971d2ab36ba30b2fe589a02bd540047526a1fd912cd19f

    • memory/2748-166-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-167-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-121-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-122-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-123-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-124-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-125-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-126-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-127-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-128-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-129-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-130-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-131-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-132-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-134-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-133-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-136-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-137-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-138-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-135-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-159-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-140-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-141-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-142-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-143-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-144-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-145-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-146-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-148-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-147-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-149-0x00000000007C0000-0x00000000008C0000-memory.dmp

      Filesize

      1024KB

    • memory/2748-150-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-151-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-152-0x00000000055E0000-0x0000000005ADE000-memory.dmp

      Filesize

      5.0MB

    • memory/2748-153-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-154-0x0000000005180000-0x0000000005212000-memory.dmp

      Filesize

      584KB

    • memory/2748-155-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-156-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-157-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-158-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-161-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-163-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-164-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-165-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-115-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-162-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-120-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-160-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-139-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-168-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-170-0x00000000050F0000-0x00000000050FA000-memory.dmp

      Filesize

      40KB

    • memory/2748-171-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-169-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-172-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-173-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-176-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-178-0x0000000005310000-0x0000000005320000-memory.dmp

      Filesize

      64KB

    • memory/2748-177-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-175-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-174-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-179-0x00000000055D0000-0x00000000055DA000-memory.dmp

      Filesize

      40KB

    • memory/2748-180-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-181-0x00000000078F0000-0x000000000795A000-memory.dmp

      Filesize

      424KB

    • memory/2748-182-0x0000000007A10000-0x0000000007AAC000-memory.dmp

      Filesize

      624KB

    • memory/2748-183-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-184-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-185-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-186-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-116-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-117-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-118-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-119-0x0000000077100000-0x000000007728E000-memory.dmp

      Filesize

      1.6MB

    • memory/2748-271-0x0000000007990000-0x00000000079C0000-memory.dmp

      Filesize

      192KB

    • memory/3372-375-0x00000000082B0000-0x0000000008316000-memory.dmp

      Filesize

      408KB

    • memory/3372-911-0x00000000075E0000-0x00000000075E8000-memory.dmp

      Filesize

      32KB

    • memory/3372-902-0x00000000075F0000-0x000000000760A000-memory.dmp

      Filesize

      104KB

    • memory/3372-456-0x0000000009CA0000-0x0000000009D45000-memory.dmp

      Filesize

      660KB

    • memory/3372-396-0x00000000087B0000-0x00000000087FB000-memory.dmp

      Filesize

      300KB

    • memory/3372-439-0x00000000098F0000-0x000000000990E000-memory.dmp

      Filesize

      120KB

    • memory/3372-438-0x0000000009910000-0x0000000009943000-memory.dmp

      Filesize

      204KB

    • memory/3380-376-0x00000000072F0000-0x0000000007356000-memory.dmp

      Filesize

      408KB

    • memory/3380-303-0x0000000006CC0000-0x00000000072E8000-memory.dmp

      Filesize

      6.2MB

    • memory/3380-373-0x0000000006B00000-0x0000000006B22000-memory.dmp

      Filesize

      136KB

    • memory/3380-381-0x0000000007540000-0x0000000007890000-memory.dmp

      Filesize

      3.3MB

    • memory/3380-395-0x0000000007420000-0x000000000743C000-memory.dmp

      Filesize

      112KB

    • memory/3380-409-0x0000000007BD0000-0x0000000007C46000-memory.dmp

      Filesize

      472KB

    • memory/3380-282-0x0000000004170000-0x00000000041A6000-memory.dmp

      Filesize

      216KB

    • memory/3380-463-0x0000000008F50000-0x0000000008FE4000-memory.dmp

      Filesize

      592KB

    • memory/4556-361-0x0000000000400000-0x0000000000430000-memory.dmp

      Filesize

      192KB

    • memory/4556-575-0x00000000067D0000-0x0000000006820000-memory.dmp

      Filesize

      320KB

    • memory/4556-411-0x0000000005180000-0x0000000005198000-memory.dmp

      Filesize

      96KB