Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
28/08/2023, 18:21
Static task
static1
Behavioral task
behavioral1
Sample
controvoke2.1.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
controvoke2.1.exe
Resource
win10v2004-20230824-en
General
-
Target
controvoke2.1.exe
-
Size
411KB
-
MD5
3c235c238a38a7dc10d78f0ba080587f
-
SHA1
c3793be872f2621f25aa858391657967a749eed2
-
SHA256
11e6f0a94e14abfea4bdbde34de5d22b2428775f23a5ecf32c0382d9b4e23e0f
-
SHA512
180ac1fb17e1909041897bed7ca9301c2a4b75a251be815b6ff215e05a37aee85685fbc8b59552f956fd97a9f25ab658a4584f777b26f72caa3291c79e340959
-
SSDEEP
12288:2YdrUBonHv0ExODZoyXqqT4yX8TpiImGVeBsg:2YFUo/xmZMbMWVlg
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Executes dropped EXE 2 IoCs
pid Process 3000 zuwafjld.exe 1868 zuwafjld.exe -
Loads dropped DLL 2 IoCs
pid Process 2060 controvoke2.1.exe 3000 zuwafjld.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3000 set thread context of 1868 3000 zuwafjld.exe 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1868 zuwafjld.exe 1868 zuwafjld.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3000 zuwafjld.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 zuwafjld.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1868 zuwafjld.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2060 wrote to memory of 3000 2060 controvoke2.1.exe 28 PID 2060 wrote to memory of 3000 2060 controvoke2.1.exe 28 PID 2060 wrote to memory of 3000 2060 controvoke2.1.exe 28 PID 2060 wrote to memory of 3000 2060 controvoke2.1.exe 28 PID 3000 wrote to memory of 1868 3000 zuwafjld.exe 29 PID 3000 wrote to memory of 1868 3000 zuwafjld.exe 29 PID 3000 wrote to memory of 1868 3000 zuwafjld.exe 29 PID 3000 wrote to memory of 1868 3000 zuwafjld.exe 29 PID 3000 wrote to memory of 1868 3000 zuwafjld.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\controvoke2.1.exe"C:\Users\Admin\AppData\Local\Temp\controvoke2.1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe"C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe"C:\Users\Admin\AppData\Local\Temp\zuwafjld.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
336KB
MD59eb099e5c928e2be363652590e021ad1
SHA136d6add7395bc509737ae10a0d0ae1b9e33eaf71
SHA256fc5242d4904704be57768e996fe494ace2aa6d933138f5acf6841a36f429504d
SHA5123ba00ce003a70a6c31ebdd6da73886a09e72cea2b2d3bde7d8280f714ff0103c90eaecbf0251c2f42532ae7065c92f766f4776f60e8037c3117bd3765a6318d3
-
Filesize
180KB
MD594b2ea1a3022b923e5af0eb721b41f83
SHA1babcaa8f79d14fda035808a372101d6a3d370789
SHA256ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf
SHA51216a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e
-
Filesize
180KB
MD594b2ea1a3022b923e5af0eb721b41f83
SHA1babcaa8f79d14fda035808a372101d6a3d370789
SHA256ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf
SHA51216a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e
-
Filesize
180KB
MD594b2ea1a3022b923e5af0eb721b41f83
SHA1babcaa8f79d14fda035808a372101d6a3d370789
SHA256ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf
SHA51216a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e
-
Filesize
180KB
MD594b2ea1a3022b923e5af0eb721b41f83
SHA1babcaa8f79d14fda035808a372101d6a3d370789
SHA256ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf
SHA51216a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e
-
Filesize
180KB
MD594b2ea1a3022b923e5af0eb721b41f83
SHA1babcaa8f79d14fda035808a372101d6a3d370789
SHA256ce54f7b569b8b8308fbffa1944569606c8eb6e65547a901256b059367c163bbf
SHA51216a6fa5e98adca3aec5c3ce628829eda2f0b0342709f9457b17c7012e5f2649b6968a5db18ea42945cb898a426a40bcb34ad4d53412e1ef1c7c579f339c7ed1e