Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
67s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
14/02/2023, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
shipping document.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
shipping document.exe
Resource
win10v2004-20220901-en
General
-
Target
shipping document.exe
-
Size
562KB
-
MD5
303efa74e4e9cf4a07a685d45b62b2a8
-
SHA1
43b21136f103e62f2af9745d3ffaec9883a52b66
-
SHA256
7878c151e7275b02792479eb673f4406f15aca3242e4b525ddecda93c06ea312
-
SHA512
b95109a37d83c735e20a37dbecfb3aba712f0e2460c329c7db9cc28b884ad37af5b2e42ff5beb6afe5798440cbd6108c85cf8d4890c06140f4c80dfa2976eda9
-
SSDEEP
12288:raFFZ6wajEsd1U+WvDeToTopNGpR6bxRXO/5TiTm4HoFzLj:g61jEsvSYoT8w6bx1O/BiTjozL
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.abaexlogistics.com - Port:
587 - Username:
[email protected] - Password:
Op3r@2021! - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\zOwta = "C:\\Users\\Admin\\AppData\\Roaming\\zOwta\\zOwta.exe" RegSvcs.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1320 set thread context of 1648 1320 shipping document.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1320 shipping document.exe 1320 shipping document.exe 1320 shipping document.exe 468 powershell.exe 1816 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1320 shipping document.exe Token: SeDebugPrivilege 1648 RegSvcs.exe Token: SeDebugPrivilege 468 powershell.exe Token: SeDebugPrivilege 1816 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1648 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1320 wrote to memory of 1816 1320 shipping document.exe 28 PID 1320 wrote to memory of 1816 1320 shipping document.exe 28 PID 1320 wrote to memory of 1816 1320 shipping document.exe 28 PID 1320 wrote to memory of 1816 1320 shipping document.exe 28 PID 1320 wrote to memory of 468 1320 shipping document.exe 30 PID 1320 wrote to memory of 468 1320 shipping document.exe 30 PID 1320 wrote to memory of 468 1320 shipping document.exe 30 PID 1320 wrote to memory of 468 1320 shipping document.exe 30 PID 1320 wrote to memory of 616 1320 shipping document.exe 32 PID 1320 wrote to memory of 616 1320 shipping document.exe 32 PID 1320 wrote to memory of 616 1320 shipping document.exe 32 PID 1320 wrote to memory of 616 1320 shipping document.exe 32 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 PID 1320 wrote to memory of 1648 1320 shipping document.exe 34 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\shipping document.exe"C:\Users\Admin\AppData\Local\Temp\shipping document.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\shipping document.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CyWJwnu.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:468
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CyWJwnu" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBE12.tmp"2⤵
- Creates scheduled task(s)
PID:616
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:1648
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD525b0ad286a47450f2f9ce722a82876e1
SHA1f1fc7a45fe2bb3d35f47a31575a665e537df707a
SHA2566294616e5c16cfe0c65be978bdb5a42554c888cd5859fc8bba047c174726ebc2
SHA512b7284b1b7ce408c734f0c73c74f31853194590ef5cdc4ca0cb16231521e57d03708800e51bb2fa776def4bef55020562ae9434463c8a2d75e7fa94d101642b2e
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c76fe2b327960693e518bbc85533b5b1
SHA1cd5914ea2c6e2f23a2dc1dcb3bef0659f8aea6b1
SHA256074eeece7178f2b1d994ac5d23088a878b8450ae8e8fd7a997fddcebad30acd9
SHA512e15448320f25561c761ad7585243aac3b6442858460270189e76baa62f231c03dfdd49532347c88aad78efb4fbb1cad603b0ccd356f1b0d74dafb859d325ebba