Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
18/09/2023, 10:57
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v2004-20230915-en
General
-
Target
1.exe
-
Size
600KB
-
MD5
77348c455ca0c859d9a00f3ada71cb74
-
SHA1
e18fd626e7f20173fc46970a6387068421598f50
-
SHA256
56b42ce524e101188605f0c0f6efaa7f4e77f4754dcb62607e6b53c45e4952be
-
SHA512
201476aeba07abafe4c9739aef3da14ff2ec01d289f312d1d513e6ac117f2ce980e90dfdd3ee24cae1417e728f7edbdf658ae5447cecaac225a04e6101491af7
-
SSDEEP
12288:FYZAfDuHOX9SnM62XAFZbz5ZzVJg3uL6HlcyuN1LUpn6ZE4ZljqS:FYZgji8g/5Zzjg+XBUpnOE4Zl
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.adityagroup.co - Port:
587 - Username:
[email protected] - Password:
Aditya!@#$%^ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2056 set thread context of 1568 2056 1.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2056 1.exe 2056 1.exe 2056 1.exe 2056 1.exe 2056 1.exe 2056 1.exe 2648 powershell.exe 2744 powershell.exe 2056 1.exe 2056 1.exe 2056 1.exe 2056 1.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2056 1.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2744 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2744 2056 1.exe 30 PID 2056 wrote to memory of 2744 2056 1.exe 30 PID 2056 wrote to memory of 2744 2056 1.exe 30 PID 2056 wrote to memory of 2744 2056 1.exe 30 PID 2056 wrote to memory of 2648 2056 1.exe 32 PID 2056 wrote to memory of 2648 2056 1.exe 32 PID 2056 wrote to memory of 2648 2056 1.exe 32 PID 2056 wrote to memory of 2648 2056 1.exe 32 PID 2056 wrote to memory of 2676 2056 1.exe 34 PID 2056 wrote to memory of 2676 2056 1.exe 34 PID 2056 wrote to memory of 2676 2056 1.exe 34 PID 2056 wrote to memory of 2676 2056 1.exe 34 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 2564 2056 1.exe 36 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37 PID 2056 wrote to memory of 1568 2056 1.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\npyoZBxDJojJkK.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\npyoZBxDJojJkK" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF90E.tmp"2⤵
- Creates scheduled task(s)
PID:2676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2564
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:1568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD54507d551f0fb6b508e40a2fb229561d6
SHA1f097f340578ff277855e4e454d43295f52c21506
SHA2569230ed1680467969f73165a6bebda0fa647689e302c23518ba62d8d0b16395ee
SHA5127d7128a8118cee5e2e94b2c5d8d4858c5ebf29a4f4e3c297dc2da2e47cc64217de661c0de1c5d4a7b7b45ca457df5ad4365f170173b1253e09000cfbcd60ad2b
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ARHNAYM3L299POWSW2FG.temp
Filesize7KB
MD5c3bedbc74764dd09d0fcbe12f98a968b
SHA11e336116d6c00823fd8eb20e058628150176bf6f
SHA256c2d2cd9187a1d87838f597accc5cf2825b35b7a705d0acde245fde797542d955
SHA5121a312321e2d073348957698adc661a5b4d4f05d2e0763a569998c924891019d72f035b8560e27b200dcbbacec8a0c7e841e04de9608e36f282fe7d01005bd767
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c3bedbc74764dd09d0fcbe12f98a968b
SHA11e336116d6c00823fd8eb20e058628150176bf6f
SHA256c2d2cd9187a1d87838f597accc5cf2825b35b7a705d0acde245fde797542d955
SHA5121a312321e2d073348957698adc661a5b4d4f05d2e0763a569998c924891019d72f035b8560e27b200dcbbacec8a0c7e841e04de9608e36f282fe7d01005bd767