Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    100s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    06/01/2023, 13:38

General

  • Target

    ac83d6b235460fb3516e0efb7b91d2159ab4636e.rtf

  • Size

    26KB

  • MD5

    051873c5ce8770dd82270d6ac13e3061

  • SHA1

    ac83d6b235460fb3516e0efb7b91d2159ab4636e

  • SHA256

    5f8573d933fb9af96a8e7fb3ad4083e7d5fdad2c4a5960b7dc7f79bb788b6658

  • SHA512

    b424ea79c54f3743692d7831154cbb123f204a6ab41a889c6d7f39f17d8ee6122b3e2782b253266b2186383afae2afd96bc05d1f0ba33b6b5db432444bfa0f4d

  • SSDEEP

    768:4Fx0XaIsnPRIa4fwJMRoSaDlnc1pzULHCdn+az:4f0Xvx3EMRodlgp5Iaz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    hnxqezadblabdsss

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ac83d6b235460fb3516e0efb7b91d2159ab4636e.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1132
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Users\Admin\AppData\Roaming\obiyu6581.exe
        "C:\Users\Admin\AppData\Roaming\obiyu6581.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1044
        • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe
          "C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe" C:\Users\Admin\AppData\Local\Temp\dhvsiqlnof.chn
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:932
          • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe
            "C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:1648

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\btjlomezd.de

      Filesize

      294KB

      MD5

      9a3100fbf00249776c39703d74c86bcb

      SHA1

      9308566b4f0cf8785801514b6c09c27ad545b5bb

      SHA256

      3d63c09cc48a8e04833c25ca7505d092e96c9239c486d00f1f19a32e776f55d2

      SHA512

      daccf35446fc9efed13227a40c0264f3968eb0efb8dd8f98eef4efc32b66f38aa3519ac3bb85d407ecde1d241c7dddbd2f455535ae53803c2c0a84992068fe1d

    • C:\Users\Admin\AppData\Local\Temp\dhvsiqlnof.chn

      Filesize

      5KB

      MD5

      093ea54ba6d9c524c8e4f208c1140716

      SHA1

      4a4e416313436fb0030bfd693b5880b1e883a05f

      SHA256

      df7f5bed79354218b633634b66b21ed1c0a8321835b446374f3f5192d0a84f3e

      SHA512

      cb44bcc354de2bcd7e5c193ee374d8db07de41c39a8b8d2620156b40c7266e754cc48a9c24119f909312760d550fac1374adca52a7855e12502049e861e8cb9a

    • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • C:\Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • C:\Users\Admin\AppData\Roaming\obiyu6581.exe

      Filesize

      463KB

      MD5

      7d8b4ff9fc0226efd409c8162928efaa

      SHA1

      7877ccd3084da333c77b353a6dc65b8e00b0a393

      SHA256

      04698304959253365ac8015e9af904b4be0e1938c63a5b91276028636a90cbbc

      SHA512

      9b1c5642f9044719a7456826dea490b329775258e84e47ac48f7563792fe466062b0a0566bda57e8755ba23982e154c2f967e5ed61dee84469f5ac3246b08fe1

    • C:\Users\Admin\AppData\Roaming\obiyu6581.exe

      Filesize

      463KB

      MD5

      7d8b4ff9fc0226efd409c8162928efaa

      SHA1

      7877ccd3084da333c77b353a6dc65b8e00b0a393

      SHA256

      04698304959253365ac8015e9af904b4be0e1938c63a5b91276028636a90cbbc

      SHA512

      9b1c5642f9044719a7456826dea490b329775258e84e47ac48f7563792fe466062b0a0566bda57e8755ba23982e154c2f967e5ed61dee84469f5ac3246b08fe1

    • \Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • \Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • \Users\Admin\AppData\Local\Temp\pxlbegicoi.exe

      Filesize

      56KB

      MD5

      b069fb341bd1f8f8141f261579101873

      SHA1

      f05df7d06aef2bd280cd6c890c6e0149128e8bb9

      SHA256

      7dacabdcc2d40579d3b95da51e702c1c561a42723955670d3b52e5801594612e

      SHA512

      00be98133467a7af257f18abf6b8d08fdfd072998ccc4deda1047624c5e3510ff0856a1d1cf0daaf133cd170dd461a3431cce246bf4aa5e3fa239afa7ac10748

    • \Users\Admin\AppData\Roaming\obiyu6581.exe

      Filesize

      463KB

      MD5

      7d8b4ff9fc0226efd409c8162928efaa

      SHA1

      7877ccd3084da333c77b353a6dc65b8e00b0a393

      SHA256

      04698304959253365ac8015e9af904b4be0e1938c63a5b91276028636a90cbbc

      SHA512

      9b1c5642f9044719a7456826dea490b329775258e84e47ac48f7563792fe466062b0a0566bda57e8755ba23982e154c2f967e5ed61dee84469f5ac3246b08fe1

    • memory/1132-81-0x000007FEFB741000-0x000007FEFB743000-memory.dmp

      Filesize

      8KB

    • memory/1204-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1204-55-0x000000006FCB1000-0x000000006FCB3000-memory.dmp

      Filesize

      8KB

    • memory/1204-54-0x0000000072231000-0x0000000072234000-memory.dmp

      Filesize

      12KB

    • memory/1204-79-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/1204-57-0x0000000074DE1000-0x0000000074DE3000-memory.dmp

      Filesize

      8KB

    • memory/1204-58-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/1204-82-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1204-83-0x0000000070C9D000-0x0000000070CA8000-memory.dmp

      Filesize

      44KB

    • memory/1648-77-0x0000000000490000-0x00000000004C8000-memory.dmp

      Filesize

      224KB

    • memory/1648-78-0x0000000000400000-0x0000000000449000-memory.dmp

      Filesize

      292KB