Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2023, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
p004575839574947.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
p004575839574947.exe
Resource
win10v2004-20230220-en
General
-
Target
p004575839574947.exe
-
Size
1.1MB
-
MD5
f90d87222db82285ce87a988b372524a
-
SHA1
b4a571be12134d9ff6c91fc8fc46b8f53ba3d176
-
SHA256
53873190e732fcbe931729aadb3d4f878d74bd17dc64c282b4efa1f87d021b43
-
SHA512
299c35d9c16ce2479b104787d04f50f644db735f540a148d07cef32a78f01343d15b9c7610ebd88482eec76e600c80f4b33152228d4af69cf43c29aa72a4e116
-
SSDEEP
12288:00ZeZOUnaKuQdJFUbDLYqid+3eo9geDCknIfblyi7uDvOI8fpXVNLhc5LiJMUZCp:9KgoYi3ImgiSs/1cNQz9oG
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.focuzpartsmart.com - Port:
587 - Username:
[email protected] - Password:
FpmJhn@2023 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4632 set thread context of 1480 4632 p004575839574947.exe 97 -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe 4632 p004575839574947.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4632 p004575839574947.exe Token: SeDebugPrivilege 1480 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 4632 wrote to memory of 2788 4632 p004575839574947.exe 83 PID 4632 wrote to memory of 2788 4632 p004575839574947.exe 83 PID 4632 wrote to memory of 4044 4632 p004575839574947.exe 84 PID 4632 wrote to memory of 4044 4632 p004575839574947.exe 84 PID 4632 wrote to memory of 4928 4632 p004575839574947.exe 85 PID 4632 wrote to memory of 4928 4632 p004575839574947.exe 85 PID 4632 wrote to memory of 4800 4632 p004575839574947.exe 86 PID 4632 wrote to memory of 4800 4632 p004575839574947.exe 86 PID 4632 wrote to memory of 4912 4632 p004575839574947.exe 87 PID 4632 wrote to memory of 4912 4632 p004575839574947.exe 87 PID 4632 wrote to memory of 4420 4632 p004575839574947.exe 88 PID 4632 wrote to memory of 4420 4632 p004575839574947.exe 88 PID 4632 wrote to memory of 1312 4632 p004575839574947.exe 89 PID 4632 wrote to memory of 1312 4632 p004575839574947.exe 89 PID 4632 wrote to memory of 4440 4632 p004575839574947.exe 90 PID 4632 wrote to memory of 4440 4632 p004575839574947.exe 90 PID 4632 wrote to memory of 3768 4632 p004575839574947.exe 91 PID 4632 wrote to memory of 3768 4632 p004575839574947.exe 91 PID 4632 wrote to memory of 1684 4632 p004575839574947.exe 92 PID 4632 wrote to memory of 1684 4632 p004575839574947.exe 92 PID 4632 wrote to memory of 1028 4632 p004575839574947.exe 93 PID 4632 wrote to memory of 1028 4632 p004575839574947.exe 93 PID 4632 wrote to memory of 3576 4632 p004575839574947.exe 94 PID 4632 wrote to memory of 3576 4632 p004575839574947.exe 94 PID 4632 wrote to memory of 2308 4632 p004575839574947.exe 95 PID 4632 wrote to memory of 2308 4632 p004575839574947.exe 95 PID 4632 wrote to memory of 4456 4632 p004575839574947.exe 96 PID 4632 wrote to memory of 4456 4632 p004575839574947.exe 96 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 PID 4632 wrote to memory of 1480 4632 p004575839574947.exe 97 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AddInProcess32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\p004575839574947.exe"C:\Users\Admin\AppData\Local\Temp\p004575839574947.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\Microsoft.Workflow.Compiler.exe"2⤵PID:2788
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"2⤵PID:4044
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AppLaunch.exe"2⤵PID:4928
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ServiceModelReg.exe"2⤵PID:4800
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"2⤵PID:4912
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\WsatConfig.exe"2⤵PID:4420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe"2⤵PID:1312
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"2⤵PID:4440
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regiis.exe"2⤵PID:3768
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\vbc.exe"2⤵PID:1684
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngentask.exe"2⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"2⤵PID:3576
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe"2⤵PID:2308
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"2⤵PID:4456
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1480
-