Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08/06/2023, 10:15

General

  • Target

    3.rtf

  • Size

    3KB

  • MD5

    b2376b5b15d1bd53f1f0dce3caf508a6

  • SHA1

    b27cbaddcf2a69e193da0d3e80b938685b44d549

  • SHA256

    a4f5010c998cf8fc3dd81dff7296ed17f975483d0a1bb3a73d89d4bd6c403ce4

  • SHA512

    7ea40778d385af3feb0ada0b5c594bb436308e0c3571b964af6fb6dce3ff618b80b637ece54c8c049a5fedfc0eed7d49076c8b7924ada298cb720bf227073b2e

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6116242756:AAGrnsiVT7lFhtm28Kz-vfXMED52iPxAFgc/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\3.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1304
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:788
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Users\Admin\AppData\Roaming\word.exe
        C:\Users\Admin\AppData\Roaming\word.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:552
        • C:\Users\Admin\AppData\Roaming\word.exe
          "C:\Users\Admin\AppData\Roaming\word.exe"
          3⤵
          • Executes dropped EXE
          • Accesses Microsoft Outlook profiles
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • outlook_office_path
          • outlook_win_path
          PID:728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\word.exe

      Filesize

      307KB

      MD5

      ca54771a1543beefa81ce4ca0d49e518

      SHA1

      25555e7fcd4fa6f041a324466dbdb471543b1f57

      SHA256

      3b02952becbdc0f3d74fa64a96096862f45375b0ef7ca25ed50e67dc0d08687c

      SHA512

      046c34050d7542bdc1570a39950c94b70390d2d962b897134729400d5fc5d0e9bc8ae158dd544ac5143b8b40d2f1bc501430e820e7049ff5bef4c532226cefda

    • C:\Users\Admin\AppData\Roaming\word.exe

      Filesize

      307KB

      MD5

      ca54771a1543beefa81ce4ca0d49e518

      SHA1

      25555e7fcd4fa6f041a324466dbdb471543b1f57

      SHA256

      3b02952becbdc0f3d74fa64a96096862f45375b0ef7ca25ed50e67dc0d08687c

      SHA512

      046c34050d7542bdc1570a39950c94b70390d2d962b897134729400d5fc5d0e9bc8ae158dd544ac5143b8b40d2f1bc501430e820e7049ff5bef4c532226cefda

    • C:\Users\Admin\AppData\Roaming\word.exe

      Filesize

      307KB

      MD5

      ca54771a1543beefa81ce4ca0d49e518

      SHA1

      25555e7fcd4fa6f041a324466dbdb471543b1f57

      SHA256

      3b02952becbdc0f3d74fa64a96096862f45375b0ef7ca25ed50e67dc0d08687c

      SHA512

      046c34050d7542bdc1570a39950c94b70390d2d962b897134729400d5fc5d0e9bc8ae158dd544ac5143b8b40d2f1bc501430e820e7049ff5bef4c532226cefda

    • C:\Users\Admin\AppData\Roaming\word.exe

      Filesize

      307KB

      MD5

      ca54771a1543beefa81ce4ca0d49e518

      SHA1

      25555e7fcd4fa6f041a324466dbdb471543b1f57

      SHA256

      3b02952becbdc0f3d74fa64a96096862f45375b0ef7ca25ed50e67dc0d08687c

      SHA512

      046c34050d7542bdc1570a39950c94b70390d2d962b897134729400d5fc5d0e9bc8ae158dd544ac5143b8b40d2f1bc501430e820e7049ff5bef4c532226cefda

    • \Users\Admin\AppData\Local\Temp\nsy3102.tmp\xgnyqzoi.dll

      Filesize

      40KB

      MD5

      3aad80011a47c4f1fc05c08790d23925

      SHA1

      2454bd058fd120de54b836a7dfe64b10152f280b

      SHA256

      1acc9d956a4e5e146c7935dcd9b27132f51e9fb66bd25004eea011215e0bc49d

      SHA512

      876393adf58ba7b7df113eb1e5a52e4a521880706e2f55afe99047ff72c0e0b5e9aff839815ce0c0df8fce040b9778b8cadaccc742e3ec47c68393fe191e0c56

    • \Users\Admin\AppData\Roaming\word.exe

      Filesize

      307KB

      MD5

      ca54771a1543beefa81ce4ca0d49e518

      SHA1

      25555e7fcd4fa6f041a324466dbdb471543b1f57

      SHA256

      3b02952becbdc0f3d74fa64a96096862f45375b0ef7ca25ed50e67dc0d08687c

      SHA512

      046c34050d7542bdc1570a39950c94b70390d2d962b897134729400d5fc5d0e9bc8ae158dd544ac5143b8b40d2f1bc501430e820e7049ff5bef4c532226cefda

    • memory/728-73-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/728-76-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/728-77-0x0000000000400000-0x0000000000441000-memory.dmp

      Filesize

      260KB

    • memory/728-79-0x0000000000690000-0x00000000006C0000-memory.dmp

      Filesize

      192KB

    • memory/728-80-0x00000000045C0000-0x0000000004600000-memory.dmp

      Filesize

      256KB

    • memory/728-81-0x00000000045C0000-0x0000000004600000-memory.dmp

      Filesize

      256KB

    • memory/1304-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB