Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    07/02/2023, 14:29

General

  • Target

    PURCHASE ORDER JF&I Packaging.rtf

  • Size

    1.6MB

  • MD5

    34abb90224f8b4fd057e8fa8f5a3eb0b

  • SHA1

    8199cd6f8fba690059d7b8cac0627deba569d78b

  • SHA256

    172e6a908015dd956c606d2efa00ee8fe6ed43cd9000631dad346227e0ef5450

  • SHA512

    6606af8c45f342f9346820184fa0b920fd15d4e2475c90ddaedd60b67622d7ec7b9605ff5210dfd2eea3c068b6472d3bad43cff48f8821ae3533293aaf408305

  • SSDEEP

    24576:XqG17EWl3Eq+1pQ3v3qb29mxmF2KXT4tFswg9ogPMGwJ8aswWVeq8smDiZvMCong:t

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER JF&I Packaging.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1308
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1700
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1400
      • C:\Users\Admin\AppData\Roaming\word.exe
        C:\Users\Admin\AppData\Roaming\word.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1020
        • C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe
          "C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe" C:\Users\Admin\AppData\Local\Temp\zhrso.ch
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:856
          • C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe
            "C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe"
            4⤵
            • Executes dropped EXE
            • Accesses Microsoft Outlook profiles
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            • outlook_office_path
            • outlook_win_path
            PID:828

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nzjvaocdswp.w

      Filesize

      262KB

      MD5

      b34b1abd10b2e214669c4fc5b2687f91

      SHA1

      08cfe82d4943819165bde21ed3f77add3c9f3efd

      SHA256

      108bfc0739f244559b1f2adc1d1bf0108780142a8eefff97f074d2db9356db99

      SHA512

      abcb3560e660148014c4f25992180d5a932bc7a198f46a6386dd6facaa357162d9deb4c0b9578c5e1feda6aeea03ed620b64256bb1aff93bb46a1a402f5ca681

    • C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe

      Filesize

      129KB

      MD5

      2bf2ff48b1340de0372ba0ffce2120ce

      SHA1

      b9019661a13d8f6fb66face403ab6f77e64cbb4f

      SHA256

      b8e47489a449e0f30f89a21f1f3afac3bd6ec2a1a3dbe5b50fc612b87ab7aef1

      SHA512

      de1b3ba62664996a77eb4f713e2580a4036989bca446819a3e9fc3146f1321588d42f7c5a45f3d544b3337ffa6edd28d88c2e279110e40df0fa7ac8382316162

    • C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe

      Filesize

      129KB

      MD5

      2bf2ff48b1340de0372ba0ffce2120ce

      SHA1

      b9019661a13d8f6fb66face403ab6f77e64cbb4f

      SHA256

      b8e47489a449e0f30f89a21f1f3afac3bd6ec2a1a3dbe5b50fc612b87ab7aef1

      SHA512

      de1b3ba62664996a77eb4f713e2580a4036989bca446819a3e9fc3146f1321588d42f7c5a45f3d544b3337ffa6edd28d88c2e279110e40df0fa7ac8382316162

    • C:\Users\Admin\AppData\Local\Temp\xdsqimskb.exe

      Filesize

      129KB

      MD5

      2bf2ff48b1340de0372ba0ffce2120ce

      SHA1

      b9019661a13d8f6fb66face403ab6f77e64cbb4f

      SHA256

      b8e47489a449e0f30f89a21f1f3afac3bd6ec2a1a3dbe5b50fc612b87ab7aef1

      SHA512

      de1b3ba62664996a77eb4f713e2580a4036989bca446819a3e9fc3146f1321588d42f7c5a45f3d544b3337ffa6edd28d88c2e279110e40df0fa7ac8382316162

    • C:\Users\Admin\AppData\Local\Temp\zhrso.ch

      Filesize

      6KB

      MD5

      3f781b8dc99c36e499f4e475380a8814

      SHA1

      1c5983c8a2c465bf88f62a6def8d9474b8714552

      SHA256

      47d9b600b8588b342d5fcf1371895e6eda5028fce4501c1206939e61aacdf4ba

      SHA512

      7ee6de9d34c6739770ea6f14940a87440855ad4483355c4c0481774f8c47a506fe228aee3ccf07c5468481efbdb238d0e3007b9a3ed078e9c50e8372cb4b8497

    • C:\Users\Admin\AppData\Roaming\word.exe

      Filesize

      525KB

      MD5

      b65bb32b79df8155ab362e98ce867bee

      SHA1

      afbd102a4efcace8032559aa245e8f24fe90cc37

      SHA256

      f08aeee18c0d5984b8bf83afe0d4c9048429b0ab06af794fd79eea2f80626f44

      SHA512

      67a614c4ffd9039bede6501a99c9a76802dc7defd26a484325e01b7b3391a6e09609501501a96b8cd0478b2c5108426a2048f61ca33cb0e47d853390928912f2

    • C:\Users\Admin\AppData\Roaming\word.exe

      Filesize

      525KB

      MD5

      b65bb32b79df8155ab362e98ce867bee

      SHA1

      afbd102a4efcace8032559aa245e8f24fe90cc37

      SHA256

      f08aeee18c0d5984b8bf83afe0d4c9048429b0ab06af794fd79eea2f80626f44

      SHA512

      67a614c4ffd9039bede6501a99c9a76802dc7defd26a484325e01b7b3391a6e09609501501a96b8cd0478b2c5108426a2048f61ca33cb0e47d853390928912f2

    • \Users\Admin\AppData\Local\Temp\xdsqimskb.exe

      Filesize

      129KB

      MD5

      2bf2ff48b1340de0372ba0ffce2120ce

      SHA1

      b9019661a13d8f6fb66face403ab6f77e64cbb4f

      SHA256

      b8e47489a449e0f30f89a21f1f3afac3bd6ec2a1a3dbe5b50fc612b87ab7aef1

      SHA512

      de1b3ba62664996a77eb4f713e2580a4036989bca446819a3e9fc3146f1321588d42f7c5a45f3d544b3337ffa6edd28d88c2e279110e40df0fa7ac8382316162

    • \Users\Admin\AppData\Local\Temp\xdsqimskb.exe

      Filesize

      129KB

      MD5

      2bf2ff48b1340de0372ba0ffce2120ce

      SHA1

      b9019661a13d8f6fb66face403ab6f77e64cbb4f

      SHA256

      b8e47489a449e0f30f89a21f1f3afac3bd6ec2a1a3dbe5b50fc612b87ab7aef1

      SHA512

      de1b3ba62664996a77eb4f713e2580a4036989bca446819a3e9fc3146f1321588d42f7c5a45f3d544b3337ffa6edd28d88c2e279110e40df0fa7ac8382316162

    • \Users\Admin\AppData\Roaming\word.exe

      Filesize

      525KB

      MD5

      b65bb32b79df8155ab362e98ce867bee

      SHA1

      afbd102a4efcace8032559aa245e8f24fe90cc37

      SHA256

      f08aeee18c0d5984b8bf83afe0d4c9048429b0ab06af794fd79eea2f80626f44

      SHA512

      67a614c4ffd9039bede6501a99c9a76802dc7defd26a484325e01b7b3391a6e09609501501a96b8cd0478b2c5108426a2048f61ca33cb0e47d853390928912f2

    • memory/828-75-0x0000000001E00000-0x0000000001E30000-memory.dmp

      Filesize

      192KB

    • memory/828-76-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/1308-55-0x0000000070601000-0x0000000070603000-memory.dmp

      Filesize

      8KB

    • memory/1308-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1308-58-0x00000000715ED000-0x00000000715F8000-memory.dmp

      Filesize

      44KB

    • memory/1308-54-0x0000000072B81000-0x0000000072B84000-memory.dmp

      Filesize

      12KB

    • memory/1308-57-0x0000000075931000-0x0000000075933000-memory.dmp

      Filesize

      8KB

    • memory/1308-77-0x00000000715ED000-0x00000000715F8000-memory.dmp

      Filesize

      44KB

    • memory/1308-80-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1308-81-0x00000000715ED000-0x00000000715F8000-memory.dmp

      Filesize

      44KB

    • memory/1700-79-0x000007FEFC091000-0x000007FEFC093000-memory.dmp

      Filesize

      8KB