Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
11c15539131...b2.exe
windows7-x64
11c15539131...b2.exe
windows10-1703-x64
101c15539131...b2.exe
windows10-2004-x64
10FedEx EL18...00.exe
windows7-x64
10FedEx EL18...00.exe
windows10-1703-x64
10FedEx EL18...00.exe
windows10-2004-x64
10HSBC_Swift...df.exe
windows7-x64
10HSBC_Swift...df.exe
windows10-1703-x64
10HSBC_Swift...df.exe
windows10-2004-x64
10Halkbank_E...68.exe
windows7-x64
10Halkbank_E...68.exe
windows10-1703-x64
10Halkbank_E...68.exe
windows10-2004-x64
10SecuriteIn...75.exe
windows7-x64
10SecuriteIn...75.exe
windows10-1703-x64
10SecuriteIn...75.exe
windows10-2004-x64
10epTZLp5PyVs2lsz.exe
windows7-x64
10epTZLp5PyVs2lsz.exe
windows10-1703-x64
10epTZLp5PyVs2lsz.exe
windows10-2004-x64
10f227b51c63...cc.exe
windows7-x64
10f227b51c63...cc.exe
windows10-1703-x64
10f227b51c63...cc.exe
windows10-2004-x64
10f2335865a4...a3.exe
windows7-x64
10f2335865a4...a3.exe
windows10-1703-x64
10f2335865a4...a3.exe
windows10-2004-x64
10Resubmissions
27/12/2022, 14:34
221227-rxqn8afa54 1027/12/2022, 14:34
221227-rxfh9afa52 1025/12/2022, 11:46
221225-nxcwksee8w 10Analysis
-
max time kernel
81s -
max time network
152s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
27/12/2022, 14:34
Static task
static1
Behavioral task
behavioral1
Sample
1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
Resource
win10-20220901-en
Behavioral task
behavioral3
Sample
1c15539131a4b7a2864bf1cc5744ea213fce23e8b643d2cd00f0a242f4e775b2.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
FedEx EL1870335D online Customer AWB Shipping Advisory AWB Docs.Commercial Invoice. Packing List. Bill of Landing CMS00.exe
Resource
win7-20221111-en
Behavioral task
behavioral5
Sample
FedEx EL1870335D online Customer AWB Shipping Advisory AWB Docs.Commercial Invoice. Packing List. Bill of Landing CMS00.exe
Resource
win10-20220812-en
Behavioral task
behavioral6
Sample
FedEx EL1870335D online Customer AWB Shipping Advisory AWB Docs.Commercial Invoice. Packing List. Bill of Landing CMS00.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
HSBC_Swift_Copy.pdf.exe
Resource
win7-20221111-en
Behavioral task
behavioral8
Sample
HSBC_Swift_Copy.pdf.exe
Resource
win10-20220812-en
Behavioral task
behavioral9
Sample
HSBC_Swift_Copy.pdf.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral10
Sample
Halkbank_Ekstre_20221222_114527_468568.exe
Resource
win7-20221111-en
Behavioral task
behavioral11
Sample
Halkbank_Ekstre_20221222_114527_468568.exe
Resource
win10-20220812-en
Behavioral task
behavioral12
Sample
Halkbank_Ekstre_20221222_114527_468568.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
SecuriteInfo.com.Win64.RATX-gen.30948.8275.exe
Resource
win7-20221111-en
Behavioral task
behavioral14
Sample
SecuriteInfo.com.Win64.RATX-gen.30948.8275.exe
Resource
win10-20220812-en
Behavioral task
behavioral15
Sample
SecuriteInfo.com.Win64.RATX-gen.30948.8275.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral16
Sample
epTZLp5PyVs2lsz.exe
Resource
win7-20220901-en
Behavioral task
behavioral17
Sample
epTZLp5PyVs2lsz.exe
Resource
win10-20220812-en
Behavioral task
behavioral18
Sample
epTZLp5PyVs2lsz.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral19
Sample
f227b51c6347b3acf53b8e54e84864c2c3e4ef973226bc517f0f9852dbc1bfcc.exe
Resource
win7-20221111-en
Behavioral task
behavioral20
Sample
f227b51c6347b3acf53b8e54e84864c2c3e4ef973226bc517f0f9852dbc1bfcc.exe
Resource
win10-20220812-en
Behavioral task
behavioral21
Sample
f227b51c6347b3acf53b8e54e84864c2c3e4ef973226bc517f0f9852dbc1bfcc.exe
Resource
win10v2004-20221111-en
Behavioral task
behavioral22
Sample
f2335865a426507b47ecf5e37dcae9a3.exe
Resource
win7-20220901-en
Behavioral task
behavioral23
Sample
f2335865a426507b47ecf5e37dcae9a3.exe
Resource
win10-20220812-en
Behavioral task
behavioral24
Sample
f2335865a426507b47ecf5e37dcae9a3.exe
Resource
win10v2004-20220812-en
General
-
Target
HSBC_Swift_Copy.pdf.exe
-
Size
1001KB
-
MD5
ce3718f0a5cd81530496e4724857b0cb
-
SHA1
17aca36e82674bd55a48684acc4eef6cd02696b1
-
SHA256
980572025579ff98c1ab84aa8c0c045e075d174bc5bb166e2694590c98f90a54
-
SHA512
6f30e90a5b9412a24f9513690cfca60c57f2e615604a12ddb7e355bd80894b7f3a37d8242813c76484a258db588c3df25f193a556284c3408d98c92ae814f724
-
SSDEEP
12288:bZ+2iN1/Sr+pGrnU9xmh873NdbE9QJKQZdF+LHZnbNFphh26mdOAH8c+9epf+mDG:Q1e+gnU9cOrjEw5Zupbxhh26mlH80q
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5934477911:AAFE-T4zPYFg9j3dne3DNo28zBQV6eiIuEY/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HSBC_Swift_Copy.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HSBC_Swift_Copy.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HSBC_Swift_Copy.pdf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows\CurrentVersion\Run\JxkFp = "C:\\Users\\Admin\\AppData\\Roaming\\JxkFp\\JxkFp.exe" HSBC_Swift_Copy.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2748 set thread context of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4852 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2748 HSBC_Swift_Copy.pdf.exe 2748 HSBC_Swift_Copy.pdf.exe 3372 powershell.exe 3380 powershell.exe 3372 powershell.exe 3380 powershell.exe 4556 HSBC_Swift_Copy.pdf.exe 4556 HSBC_Swift_Copy.pdf.exe 3372 powershell.exe 3380 powershell.exe 4556 HSBC_Swift_Copy.pdf.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2748 HSBC_Swift_Copy.pdf.exe Token: SeDebugPrivilege 3380 powershell.exe Token: SeDebugPrivilege 3372 powershell.exe Token: SeDebugPrivilege 4556 HSBC_Swift_Copy.pdf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4556 HSBC_Swift_Copy.pdf.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2748 wrote to memory of 3380 2748 HSBC_Swift_Copy.pdf.exe 67 PID 2748 wrote to memory of 3380 2748 HSBC_Swift_Copy.pdf.exe 67 PID 2748 wrote to memory of 3380 2748 HSBC_Swift_Copy.pdf.exe 67 PID 2748 wrote to memory of 3372 2748 HSBC_Swift_Copy.pdf.exe 69 PID 2748 wrote to memory of 3372 2748 HSBC_Swift_Copy.pdf.exe 69 PID 2748 wrote to memory of 3372 2748 HSBC_Swift_Copy.pdf.exe 69 PID 2748 wrote to memory of 4852 2748 HSBC_Swift_Copy.pdf.exe 70 PID 2748 wrote to memory of 4852 2748 HSBC_Swift_Copy.pdf.exe 70 PID 2748 wrote to memory of 4852 2748 HSBC_Swift_Copy.pdf.exe 70 PID 2748 wrote to memory of 4620 2748 HSBC_Swift_Copy.pdf.exe 73 PID 2748 wrote to memory of 4620 2748 HSBC_Swift_Copy.pdf.exe 73 PID 2748 wrote to memory of 4620 2748 HSBC_Swift_Copy.pdf.exe 73 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 PID 2748 wrote to memory of 4556 2748 HSBC_Swift_Copy.pdf.exe 74 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HSBC_Swift_Copy.pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3844063266-715245855-4050956231-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 HSBC_Swift_Copy.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\TBcRbJIkEv.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3372
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TBcRbJIkEv" /XML "C:\Users\Admin\AppData\Local\Temp\tmp937.tmp"2⤵
- Creates scheduled task(s)
PID:4852
-
-
C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"2⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"C:\Users\Admin\AppData\Local\Temp\HSBC_Swift_Copy.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50c2899d7c6746f42d5bbe088c777f94c
SHA1622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1
SHA2565b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458
SHA512ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078
-
Filesize
2KB
MD5db01a2c1c7e70b2b038edf8ad5ad9826
SHA1540217c647a73bad8d8a79e3a0f3998b5abd199b
SHA256413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d
SHA512c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6
-
Filesize
18KB
MD5f17e2735bef3dd31f25b6f5325ab1116
SHA108db1144a8c9c92664a247a48d29a8c18f820c61
SHA25637c750352516d2131fba9c673963004432ccfe475dc5281da7e4ea80637eae57
SHA5124bf4465383d0f9559debfb880de6d93191dac8c7ae34afe8a5e5bafab6712a438449644ed5ae0bf758addb7832e78cc114c1b1d2de034dc1af31eaace2bcd2b5
-
Filesize
1KB
MD546b7a9e1ae34454ec464f76b6c075c39
SHA1e0225ff4c145dd43f1fd09b7c6b09cc8c1244f70
SHA256a8424d8a5ecb0e3e5056c8285c2f1c00004062a83123716dd1a06471d3219bab
SHA5127f7979839693b2733a09d03c973183aafc7461084991e84fa989c1b2b32e3bfe90a6a21a2269890518971d2ab36ba30b2fe589a02bd540047526a1fd912cd19f