Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
15/03/2023, 16:57
Static task
static1
Behavioral task
behavioral1
Sample
100 gab.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
100 gab.exe
Resource
win10v2004-20230220-en
General
-
Target
100 gab.exe
-
Size
1.2MB
-
MD5
38462e84ce0cb6d961452e6b0e20c83c
-
SHA1
86bf94777e67a820191cec9857182ff6d404539d
-
SHA256
8cc7a30b218d8c4e4dbeef936290a726ebfdb9ea1b9af35dab970ce4bb5352bc
-
SHA512
ce0c3020cdc5576d0437778db2e6521d77872a3d02c755430afdce41321c8489b2c80eff05beaa7bb8e63d3c4abc2298e3fdaca8bd2389027cf1cab4f3ec5820
-
SSDEEP
24576:QqGnNerctUvpL0V5Uk86JsJPG8ODWfMMFR5UitDJ6Bz5d:lctOpaWo8aWfLF/f6Bz5d
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5693068931:AAGSQSNIWDJM1FzeZVNHS020I9wVBrQdkRM/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 100 gab.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 100 gab.exe Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 100 gab.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1348 set thread context of 1672 1348 100 gab.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 676 powershell.exe 1712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1672 100 gab.exe Token: SeDebugPrivilege 676 powershell.exe Token: SeDebugPrivilege 1712 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1348 wrote to memory of 676 1348 100 gab.exe 27 PID 1348 wrote to memory of 676 1348 100 gab.exe 27 PID 1348 wrote to memory of 676 1348 100 gab.exe 27 PID 1348 wrote to memory of 676 1348 100 gab.exe 27 PID 1348 wrote to memory of 1712 1348 100 gab.exe 29 PID 1348 wrote to memory of 1712 1348 100 gab.exe 29 PID 1348 wrote to memory of 1712 1348 100 gab.exe 29 PID 1348 wrote to memory of 1712 1348 100 gab.exe 29 PID 1348 wrote to memory of 1668 1348 100 gab.exe 31 PID 1348 wrote to memory of 1668 1348 100 gab.exe 31 PID 1348 wrote to memory of 1668 1348 100 gab.exe 31 PID 1348 wrote to memory of 1668 1348 100 gab.exe 31 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 PID 1348 wrote to memory of 1672 1348 100 gab.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 100 gab.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 100 gab.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\100 gab.exe"C:\Users\Admin\AppData\Local\Temp\100 gab.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\100 gab.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\daHysTSY.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\daHysTSY" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC91A.tmp"2⤵
- Creates scheduled task(s)
PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\100 gab.exe"C:\Users\Admin\AppData\Local\Temp\100 gab.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1672
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a7e176532314aa9ba092205c84a5d7d8
SHA122c2115da8e8aff05f7f2bb9ed48d8fba893e917
SHA25669eb0cefe16ebd95802ee3c143a186f339f60ac1532e3175460c724b22377f4a
SHA51281e232f50977ba512eeffc4c77bd2edf67873afe3551d93fdee541f871294bf2e2459f0654ceb46cb8ce6f8c58bf8e46feb437fefad7eb3874b20db731d2289f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GRX6ZVH3RN6JX15SXGM6.temp
Filesize7KB
MD5ab7cc51d941cbdbc21e56326af214ec5
SHA10cc4bc1bbd3e59b7a29f529d2f23d25bfd631567
SHA256367bf0e89b4cff0bf570f810cf224c9a5230f11b075bda33a1c891533b2b1a46
SHA512ca24227eb302c6277cb17d2a194a5363f64d2e00683266b5e731c4223a44839ba7995e3d36e66c9425506ad73d5db5e2a9d2f8a66f42238dc35efa3acfb9bb91
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5ab7cc51d941cbdbc21e56326af214ec5
SHA10cc4bc1bbd3e59b7a29f529d2f23d25bfd631567
SHA256367bf0e89b4cff0bf570f810cf224c9a5230f11b075bda33a1c891533b2b1a46
SHA512ca24227eb302c6277cb17d2a194a5363f64d2e00683266b5e731c4223a44839ba7995e3d36e66c9425506ad73d5db5e2a9d2f8a66f42238dc35efa3acfb9bb91