Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip (SWIFT)·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Payment Slip (SWIFT)·PDF.scr
Resource
win10v2004-20230915-en
General
-
Target
Payment Slip (SWIFT)·PDF.scr
-
Size
2.1MB
-
MD5
aa172e2518840dd8e47c36520639f99f
-
SHA1
0c87154c41dd9cc5296259fa4ccdba17fcb057e5
-
SHA256
e1b45cf3afc2cecdee5a2da5517404bead4e28b31fa09f95eb45e8421acd4c7b
-
SHA512
267dee5888c2a31c0a956ce2ca32b004afae8c0ad2eec1420fd8bd676fb5d675381e4ea37bb0f8fcf58c9dd0a9c1e6a09b3bad9d355c409a0233225c4a528e29
-
SSDEEP
24576:tfDf12Bap8DH508+gOCWLd491xCeG0FpcM+bKssK6aG9O:trMBaIy9mvcMbsF1g
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
PD#Hmarr#597r%@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3044 set thread context of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2668 ipconfig.exe 2684 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3044 Payment Slip (SWIFT)·PDF.scr 684 AppLaunch.exe 684 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3044 Payment Slip (SWIFT)·PDF.scr Token: SeDebugPrivilege 684 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 684 AppLaunch.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 3044 wrote to memory of 2352 3044 Payment Slip (SWIFT)·PDF.scr 28 PID 3044 wrote to memory of 2352 3044 Payment Slip (SWIFT)·PDF.scr 28 PID 3044 wrote to memory of 2352 3044 Payment Slip (SWIFT)·PDF.scr 28 PID 3044 wrote to memory of 2352 3044 Payment Slip (SWIFT)·PDF.scr 28 PID 2352 wrote to memory of 2668 2352 cmd.exe 30 PID 2352 wrote to memory of 2668 2352 cmd.exe 30 PID 2352 wrote to memory of 2668 2352 cmd.exe 30 PID 2352 wrote to memory of 2668 2352 cmd.exe 30 PID 3044 wrote to memory of 2028 3044 Payment Slip (SWIFT)·PDF.scr 33 PID 3044 wrote to memory of 2028 3044 Payment Slip (SWIFT)·PDF.scr 33 PID 3044 wrote to memory of 2028 3044 Payment Slip (SWIFT)·PDF.scr 33 PID 3044 wrote to memory of 2028 3044 Payment Slip (SWIFT)·PDF.scr 33 PID 2028 wrote to memory of 2684 2028 cmd.exe 35 PID 2028 wrote to memory of 2684 2028 cmd.exe 35 PID 2028 wrote to memory of 2684 2028 cmd.exe 35 PID 2028 wrote to memory of 2684 2028 cmd.exe 35 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 PID 3044 wrote to memory of 684 3044 Payment Slip (SWIFT)·PDF.scr 36 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3849525425-30183055-657688904-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip (SWIFT)·PDF.scr"C:\Users\Admin\AppData\Local\Temp\Payment Slip (SWIFT)·PDF.scr" /S1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2684
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:684
-