Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
262s -
max time network
359s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2023, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe
Resource
win10v2004-20221111-en
General
-
Target
fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe
-
Size
37KB
-
MD5
af72e06f3c672737077fd04a6cd44af1
-
SHA1
fea30b1b6cf409b3e29c703cea59f179f8c426d6
-
SHA256
e2e7cc72bc5d7046056f1784e2b21f760359131dbb37329e880211cf28ee69d0
-
SHA512
c33e555243abb294436331d269de134283c71d9f7ecd94b1e05e69c04a230d6a1653c1d9e7ad7abfa440df227ca3e1591194c53b71dec637bc103244d003264e
-
SSDEEP
768:YevzNw901TxGi+ZPc3XyvgQu9Et+mZqt5RYVMLvZO4v:zNwe1T4i+ZPoXyYQss++qtfYys
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.elec-qatar.com - Port:
587 - Username:
[email protected] - Password:
MHabrar2019@# - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1052 set thread context of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 -
Suspicious behavior: EnumeratesProcesses 54 IoCs
pid Process 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 1052 wrote to memory of 4476 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 74 PID 1052 wrote to memory of 4476 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 74 PID 1052 wrote to memory of 2528 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 75 PID 1052 wrote to memory of 2528 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 75 PID 1052 wrote to memory of 4356 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 76 PID 1052 wrote to memory of 4356 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 76 PID 1052 wrote to memory of 4740 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 77 PID 1052 wrote to memory of 4740 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 77 PID 1052 wrote to memory of 4472 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 78 PID 1052 wrote to memory of 4472 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 78 PID 1052 wrote to memory of 4908 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 79 PID 1052 wrote to memory of 4908 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 79 PID 1052 wrote to memory of 4528 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 80 PID 1052 wrote to memory of 4528 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 80 PID 1052 wrote to memory of 4820 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 81 PID 1052 wrote to memory of 4820 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 81 PID 1052 wrote to memory of 4376 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 82 PID 1052 wrote to memory of 4376 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 82 PID 1052 wrote to memory of 4376 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 82 PID 1052 wrote to memory of 1304 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 83 PID 1052 wrote to memory of 1304 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 83 PID 1052 wrote to memory of 1288 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 84 PID 1052 wrote to memory of 1288 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 84 PID 1052 wrote to memory of 2636 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 85 PID 1052 wrote to memory of 2636 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 85 PID 1052 wrote to memory of 2092 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 86 PID 1052 wrote to memory of 2092 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 86 PID 1052 wrote to memory of 4852 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 87 PID 1052 wrote to memory of 4852 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 87 PID 1052 wrote to memory of 2412 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 88 PID 1052 wrote to memory of 2412 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 88 PID 1052 wrote to memory of 2000 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 89 PID 1052 wrote to memory of 2000 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 89 PID 1052 wrote to memory of 1420 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 90 PID 1052 wrote to memory of 1420 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 90 PID 1052 wrote to memory of 1348 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 91 PID 1052 wrote to memory of 1348 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 91 PID 1052 wrote to memory of 1448 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 92 PID 1052 wrote to memory of 1448 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 92 PID 1052 wrote to memory of 1352 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 93 PID 1052 wrote to memory of 1352 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 93 PID 1052 wrote to memory of 1272 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 94 PID 1052 wrote to memory of 1272 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 94 PID 1052 wrote to memory of 564 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 95 PID 1052 wrote to memory of 564 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 95 PID 1052 wrote to memory of 1844 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 96 PID 1052 wrote to memory of 1844 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 96 PID 1052 wrote to memory of 1124 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 97 PID 1052 wrote to memory of 1124 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 97 PID 1052 wrote to memory of 2392 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 98 PID 1052 wrote to memory of 2392 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 98 PID 1052 wrote to memory of 4892 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 99 PID 1052 wrote to memory of 4892 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 99 PID 1052 wrote to memory of 1012 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 100 PID 1052 wrote to memory of 1012 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 100 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101 PID 1052 wrote to memory of 1596 1052 fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe"C:\Users\Admin\AppData\Local\Temp\fea30b1b6cf409b3e29c703cea59f179f8c426d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:4476
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:2528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:4356
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess.exe"2⤵PID:4740
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe"2⤵PID:4472
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:4908
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"2⤵PID:4528
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\DataSvcUtil.exe"2⤵PID:4820
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\jsc.exe"2⤵PID:4376
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:1304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:1288
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:2636
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:2092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"2⤵PID:4852
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\dfsvc.exe"2⤵PID:2412
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ComSvcConfig.exe"2⤵PID:2000
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:1420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"2⤵PID:1348
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:1448
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:1352
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"2⤵PID:1272
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:564
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:1844
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe"2⤵PID:1124
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"2⤵PID:2392
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"2⤵PID:4892
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\SMSvcHost.exe"2⤵PID:1012
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵PID:1596
-