Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    155s
  • platform
    windows10-1703_x64
  • resource
    win10-20230703-en
  • resource tags

    arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system
  • submitted
    18/07/2023, 13:19

General

  • Target

    1a02d7fa71451609f38cdd2cc9a62c9254c4772316dba90087ccdfd2d2a7ac5a.exe

  • Size

    866KB

  • MD5

    ea83b0db7b3030a818b412479afe2bc2

  • SHA1

    61df33baf8ae6b03b8781870351ea58c088d1f47

  • SHA256

    1a02d7fa71451609f38cdd2cc9a62c9254c4772316dba90087ccdfd2d2a7ac5a

  • SHA512

    564e61af37ff2a4c4715f0cea94d817ef26dae153289eece7a2abb9e243bb19dfa62833976b55a0d39037ac5475a38c1aedb3e659803215c7b21e8fa06ba8914

  • SSDEEP

    12288:uqqWmS2h/m9NcTrE1Mb20wpbjFBcIZj6mbIs1pzzU4VFGQIut7D2G5JKT5b4jN:udrS2hucTg130wZFBrZjDb7Tz76x4J

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a02d7fa71451609f38cdd2cc9a62c9254c4772316dba90087ccdfd2d2a7ac5a.exe
    "C:\Users\Admin\AppData\Local\Temp\1a02d7fa71451609f38cdd2cc9a62c9254c4772316dba90087ccdfd2d2a7ac5a.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4124
    • C:\Users\Admin\AppData\Local\Temp\1a02d7fa71451609f38cdd2cc9a62c9254c4772316dba90087ccdfd2d2a7ac5a.exe
      "{path}"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:2064

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1a02d7fa71451609f38cdd2cc9a62c9254c4772316dba90087ccdfd2d2a7ac5a.exe.log

    Filesize

    1KB

    MD5

    65f1f0c7993639f9f9e1d524224a2c93

    SHA1

    5b51a6a56f3041dbc2d3f510252bbe68ffbbc59c

    SHA256

    e582e80a644a998d1b2958bdcb0cd1e899076befa7c5e868d033b3fe75a2ca93

    SHA512

    3e8953968bbc31f3105a0df28b95edfb4cee8af78ec527d47707b82e3d5fc2aa725fca574de3c963da53614e60d282408b21d075eed007be25679e9458bf1c23

  • memory/2064-134-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/2064-144-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2064-143-0x0000000073420000-0x0000000073B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2064-142-0x0000000006790000-0x0000000006952000-memory.dmp

    Filesize

    1.8MB

  • memory/2064-141-0x0000000006570000-0x00000000065C0000-memory.dmp

    Filesize

    320KB

  • memory/2064-140-0x0000000004FF0000-0x0000000005056000-memory.dmp

    Filesize

    408KB

  • memory/2064-139-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

    Filesize

    64KB

  • memory/2064-138-0x0000000073420000-0x0000000073B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/4124-126-0x00000000027B0000-0x00000000027BA000-memory.dmp

    Filesize

    40KB

  • memory/4124-137-0x0000000073420000-0x0000000073B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/4124-131-0x0000000000E50000-0x0000000000E64000-memory.dmp

    Filesize

    80KB

  • memory/4124-132-0x0000000006D40000-0x0000000006DBE000-memory.dmp

    Filesize

    504KB

  • memory/4124-133-0x0000000007200000-0x0000000007230000-memory.dmp

    Filesize

    192KB

  • memory/4124-129-0x0000000073420000-0x0000000073B0E000-memory.dmp

    Filesize

    6.9MB

  • memory/4124-128-0x0000000005890000-0x0000000005BE0000-memory.dmp

    Filesize

    3.3MB

  • memory/4124-130-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/4124-127-0x0000000004FB0000-0x0000000005006000-memory.dmp

    Filesize

    344KB

  • memory/4124-120-0x0000000000410000-0x00000000004EE000-memory.dmp

    Filesize

    888KB

  • memory/4124-125-0x0000000005010000-0x0000000005020000-memory.dmp

    Filesize

    64KB

  • memory/4124-124-0x0000000004E90000-0x0000000004F22000-memory.dmp

    Filesize

    584KB

  • memory/4124-123-0x0000000005390000-0x000000000588E000-memory.dmp

    Filesize

    5.0MB

  • memory/4124-122-0x0000000004DF0000-0x0000000004E8C000-memory.dmp

    Filesize

    624KB

  • memory/4124-121-0x0000000073420000-0x0000000073B0E000-memory.dmp

    Filesize

    6.9MB