Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/09/2023, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
BANK COPY.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
BANK COPY.exe
Resource
win10v2004-20230831-en
General
-
Target
BANK COPY.exe
-
Size
549KB
-
MD5
cc9408eff115ec6b750c751d1fc1093f
-
SHA1
559f96055dafaa4e46e0b594a5b748687dabbe8c
-
SHA256
2985214c0fbae1739d06009de458f7c2c1b38d4057f9a841e00922abe2c55103
-
SHA512
5aab5ad46b687930d17895fe44522b3930f2798c87af59c54b0587ec51fe73788027e82c3d81ed87ce7ab7db37d36bf1ab9cbbe56ba7ec4f699a3efec6fa99e6
-
SSDEEP
12288:EPsCaf/JbuqHHuE1dS68Fd58sDlN/q/afcJetqd6kuPjaz:uaf/J5uIS6818sLaCYd07az
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
kV$bSqJ1 daniel - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK COPY.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK COPY.exe Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK COPY.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows\CurrentVersion\Run\sOFvE = "C:\\Users\\Admin\\AppData\\Roaming\\sOFvE\\sOFvE.exe" BANK COPY.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2524 2376 BANK COPY.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2376 BANK COPY.exe 2376 BANK COPY.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2376 BANK COPY.exe Token: SeDebugPrivilege 2524 BANK COPY.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2940 2376 BANK COPY.exe 30 PID 2376 wrote to memory of 2940 2376 BANK COPY.exe 30 PID 2376 wrote to memory of 2940 2376 BANK COPY.exe 30 PID 2376 wrote to memory of 2940 2376 BANK COPY.exe 30 PID 2376 wrote to memory of 1420 2376 BANK COPY.exe 32 PID 2376 wrote to memory of 1420 2376 BANK COPY.exe 32 PID 2376 wrote to memory of 1420 2376 BANK COPY.exe 32 PID 2376 wrote to memory of 1420 2376 BANK COPY.exe 32 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 PID 2376 wrote to memory of 2524 2376 BANK COPY.exe 33 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK COPY.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3513876443-2771975297-1923446376-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 BANK COPY.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\BANK COPY.exe"C:\Users\Admin\AppData\Local\Temp\BANK COPY.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IDzJoA" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7EB1.tmp"2⤵
- Creates scheduled task(s)
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\BANK COPY.exe"{path}"2⤵PID:1420
-
-
C:\Users\Admin\AppData\Local\Temp\BANK COPY.exe"{path}"2⤵
- Accesses Microsoft Outlook profiles
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b6bd597cacdd1c1ca7a55fc85f96b32d
SHA1e691272bc1fd30a567a0faed455dcc46baf3b1d7
SHA256a8c0a4a70189ec22c29b379ebef450eb953294dd1f4a474a98f945e588d880ea
SHA512b2a8dd2a68ed0c21caed1921218667cf2a629ea0661a0446d4186a4b6df7e5a1e915474f422edd3b0229a0dbc17d89cc3e1142f2187aac50af9b0c9180953558