Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2023, 13:31
Static task
static1
Behavioral task
behavioral1
Sample
satın alma emri.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
satın alma emri.exe
Resource
win10v2004-20230703-en
General
-
Target
satın alma emri.exe
-
Size
456KB
-
MD5
2c0f7daa0637923f321617d6bbc2c968
-
SHA1
da5f7fca6da24d2f065d68bc32a127089b7c42ed
-
SHA256
67a1d95ac501b3239795c12bdebe20853519e92810d5124bff570a5f9001d440
-
SHA512
89098cf7e98ad22b56ce7415db68a26afa1f3bd48c3611def7edb08242045140dd14de94e464840e36d7efb1ad5d3f72970120dd0d1e607359e2d6a0db6be3c7
-
SSDEEP
6144:z3IaL+ZdLqbt3de/e1L0U0iA3o4U5miBdthFjPLW5eVHtM3RirSdkbrs1aq:z9/p1gUVA3KxjzKeVHyRir5rs1j
Malware Config
Extracted
agenttesla
https://discordapp.com/api/webhooks/1145251777952886784/YHlqQB8-CLI8j31rwP_EM7zqJEQJXxU_Oj2JYZGz03XJ2vHM4R3mj7a-WhMivxm2KvdV
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nvncq.vbs satın alma emri.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4916 set thread context of 60 4916 satın alma emri.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 60 MSBuild.exe 60 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4916 satın alma emri.exe Token: SeDebugPrivilege 60 MSBuild.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90 PID 4916 wrote to memory of 60 4916 satın alma emri.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\satın alma emri.exe"C:\Users\Admin\AppData\Local\Temp\satın alma emri.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:60
-