Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/09/2023, 18:54

General

  • Target

    SWIFT.pdf.exe

  • Size

    538KB

  • MD5

    4b16c4589ce3211b6f45051b5fb422b0

  • SHA1

    2b60d36184571a1bc35c335ab8941c2bdc7f02b2

  • SHA256

    ac04f04d01ae5428a8017be37d7d1352ad3212852c259d1a0e2f775969ecc36c

  • SHA512

    38796bb1952559726ed4f47344962fa8dd7b051b12266f9dbfc149b5262f99f24803416ef7986577021b96bc118b39d05c95be9830b1f29ffb23c33c751b5526

  • SSDEEP

    6144:Jf4NOk8oV/BR1z/8XIppg4P/l27t9mrvlRlOYADKgt5Q1OW4kXQAN2Tr3+oUSWXh:hi+9m7H2RqF4kXQf7WX42Yu26NCc6P

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SWIFT.pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\SWIFT.pdf.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4228
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SWIFT.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:780
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UOGegcK.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4572
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UOGegcK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1A1B.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1004
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:3008

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    8a04083cdada48f9d70abd40650a8e95

    SHA1

    b70a411bf919946fd76c905079f6ea22021ef9dd

    SHA256

    1d5b09cfa00075a45bd3e3d489c8e1bf9bd5c036a3357e6835350c61b2738a3d

    SHA512

    09761c5e9321fff108db7a4d8e17974cdfa19356bfe8ee7433a87cf654a724347959aee2a69b49b30c50d8981fe5086f96a234e7fad321f179a48069613ff5dd

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xvmukqqh.jql.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmp1A1B.tmp

    Filesize

    1KB

    MD5

    df01c2af099cb92b03d080773b43fa5b

    SHA1

    c9b693da600d105ab8224de290b3e45069bb9310

    SHA256

    d1f8c6ae61e779b5f96a23b7babbe3f0c86e517abd6b8f4a2c4662f103991993

    SHA512

    817d3631ea6fb9a354c970ad73dd32182bc91b32e3077e31ae75aa044de6091de0cee929fcada33f381d1659862eb7578f3b34095aad48a65a1478663a9e0033

  • memory/780-53-0x0000000005FB0000-0x0000000005FFC000-memory.dmp

    Filesize

    304KB

  • memory/780-21-0x0000000004C40000-0x0000000005268000-memory.dmp

    Filesize

    6.2MB

  • memory/780-52-0x0000000005A40000-0x0000000005A5E000-memory.dmp

    Filesize

    120KB

  • memory/780-55-0x0000000000E10000-0x0000000000E20000-memory.dmp

    Filesize

    64KB

  • memory/780-27-0x00000000053D0000-0x0000000005436000-memory.dmp

    Filesize

    408KB

  • memory/780-57-0x0000000071880000-0x00000000718CC000-memory.dmp

    Filesize

    304KB

  • memory/780-97-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/780-91-0x0000000007070000-0x0000000007078000-memory.dmp

    Filesize

    32KB

  • memory/780-87-0x0000000006F50000-0x0000000006F61000-memory.dmp

    Filesize

    68KB

  • memory/780-86-0x0000000000E10000-0x0000000000E20000-memory.dmp

    Filesize

    64KB

  • memory/780-17-0x0000000000C90000-0x0000000000CC6000-memory.dmp

    Filesize

    216KB

  • memory/780-18-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/780-19-0x0000000000E10000-0x0000000000E20000-memory.dmp

    Filesize

    64KB

  • memory/780-59-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/780-20-0x0000000000E10000-0x0000000000E20000-memory.dmp

    Filesize

    64KB

  • memory/780-85-0x0000000000E10000-0x0000000000E20000-memory.dmp

    Filesize

    64KB

  • memory/780-71-0x0000000006000000-0x000000000601E000-memory.dmp

    Filesize

    120KB

  • memory/780-79-0x000000007F090000-0x000000007F0A0000-memory.dmp

    Filesize

    64KB

  • memory/3008-51-0x0000000005820000-0x0000000005830000-memory.dmp

    Filesize

    64KB

  • memory/3008-98-0x0000000006BA0000-0x0000000006BF0000-memory.dmp

    Filesize

    320KB

  • memory/3008-28-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3008-99-0x0000000006DC0000-0x0000000006F82000-memory.dmp

    Filesize

    1.8MB

  • memory/3008-100-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/3008-45-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/3008-101-0x0000000005820000-0x0000000005830000-memory.dmp

    Filesize

    64KB

  • memory/4228-0-0x00000000008A0000-0x000000000092A000-memory.dmp

    Filesize

    552KB

  • memory/4228-50-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/4228-5-0x0000000005330000-0x000000000533A000-memory.dmp

    Filesize

    40KB

  • memory/4228-4-0x00000000052B0000-0x00000000052C0000-memory.dmp

    Filesize

    64KB

  • memory/4228-6-0x00000000055A0000-0x000000000563C000-memory.dmp

    Filesize

    624KB

  • memory/4228-2-0x0000000005880000-0x0000000005E24000-memory.dmp

    Filesize

    5.6MB

  • memory/4228-7-0x0000000005840000-0x0000000005852000-memory.dmp

    Filesize

    72KB

  • memory/4228-8-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/4228-9-0x00000000052B0000-0x00000000052C0000-memory.dmp

    Filesize

    64KB

  • memory/4228-1-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/4228-3-0x0000000005370000-0x0000000005402000-memory.dmp

    Filesize

    584KB

  • memory/4228-11-0x00000000068E0000-0x00000000068EC000-memory.dmp

    Filesize

    48KB

  • memory/4228-10-0x00000000068D0000-0x00000000068D8000-memory.dmp

    Filesize

    32KB

  • memory/4228-12-0x0000000006D30000-0x0000000006D9A000-memory.dmp

    Filesize

    424KB

  • memory/4572-83-0x0000000007620000-0x000000000762A000-memory.dmp

    Filesize

    40KB

  • memory/4572-23-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/4572-84-0x0000000007830000-0x00000000078C6000-memory.dmp

    Filesize

    600KB

  • memory/4572-22-0x0000000002930000-0x0000000002940000-memory.dmp

    Filesize

    64KB

  • memory/4572-81-0x0000000007C00000-0x000000000827A000-memory.dmp

    Filesize

    6.5MB

  • memory/4572-54-0x0000000002930000-0x0000000002940000-memory.dmp

    Filesize

    64KB

  • memory/4572-88-0x00000000077E0000-0x00000000077EE000-memory.dmp

    Filesize

    56KB

  • memory/4572-89-0x00000000077F0000-0x0000000007804000-memory.dmp

    Filesize

    80KB

  • memory/4572-90-0x00000000078F0000-0x000000000790A000-memory.dmp

    Filesize

    104KB

  • memory/4572-82-0x00000000075B0000-0x00000000075CA000-memory.dmp

    Filesize

    104KB

  • memory/4572-92-0x0000000002930000-0x0000000002940000-memory.dmp

    Filesize

    64KB

  • memory/4572-80-0x00000000074D0000-0x0000000007573000-memory.dmp

    Filesize

    652KB

  • memory/4572-96-0x00000000751B0000-0x0000000075960000-memory.dmp

    Filesize

    7.7MB

  • memory/4572-25-0x00000000052C0000-0x00000000052E2000-memory.dmp

    Filesize

    136KB

  • memory/4572-26-0x0000000005360000-0x00000000053C6000-memory.dmp

    Filesize

    408KB

  • memory/4572-56-0x0000000006880000-0x00000000068B2000-memory.dmp

    Filesize

    200KB

  • memory/4572-58-0x0000000071880000-0x00000000718CC000-memory.dmp

    Filesize

    304KB

  • memory/4572-49-0x0000000005DC0000-0x0000000006114000-memory.dmp

    Filesize

    3.3MB