Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 07:30
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip (SWIFT)·PDF.scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Payment Slip (SWIFT)·PDF.scr
Resource
win10v2004-20230915-en
General
-
Target
Payment Slip (SWIFT)·PDF.scr
-
Size
2.1MB
-
MD5
aa172e2518840dd8e47c36520639f99f
-
SHA1
0c87154c41dd9cc5296259fa4ccdba17fcb057e5
-
SHA256
e1b45cf3afc2cecdee5a2da5517404bead4e28b31fa09f95eb45e8421acd4c7b
-
SHA512
267dee5888c2a31c0a956ce2ca32b004afae8c0ad2eec1420fd8bd676fb5d675381e4ea37bb0f8fcf58c9dd0a9c1e6a09b3bad9d355c409a0233225c4a528e29
-
SSDEEP
24576:tfDf12Bap8DH508+gOCWLd491xCeG0FpcM+bKssK6aG9O:trMBaIy9mvcMbsF1g
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
gator3220.hostgator.com - Port:
587 - Username:
[email protected] - Password:
PD#Hmarr#597r%@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Control Panel\International\Geo\Nation Payment Slip (SWIFT)·PDF.scr -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe Key opened \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1964 set thread context of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 1352 ipconfig.exe 540 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1964 Payment Slip (SWIFT)·PDF.scr 1964 Payment Slip (SWIFT)·PDF.scr 1964 Payment Slip (SWIFT)·PDF.scr 1964 Payment Slip (SWIFT)·PDF.scr 1964 Payment Slip (SWIFT)·PDF.scr 4196 AppLaunch.exe 4196 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1964 Payment Slip (SWIFT)·PDF.scr Token: SeDebugPrivilege 4196 AppLaunch.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4196 AppLaunch.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2820 1964 Payment Slip (SWIFT)·PDF.scr 88 PID 1964 wrote to memory of 2820 1964 Payment Slip (SWIFT)·PDF.scr 88 PID 1964 wrote to memory of 2820 1964 Payment Slip (SWIFT)·PDF.scr 88 PID 2820 wrote to memory of 540 2820 cmd.exe 90 PID 2820 wrote to memory of 540 2820 cmd.exe 90 PID 2820 wrote to memory of 540 2820 cmd.exe 90 PID 1964 wrote to memory of 3376 1964 Payment Slip (SWIFT)·PDF.scr 101 PID 1964 wrote to memory of 3376 1964 Payment Slip (SWIFT)·PDF.scr 101 PID 1964 wrote to memory of 3376 1964 Payment Slip (SWIFT)·PDF.scr 101 PID 3376 wrote to memory of 1352 3376 cmd.exe 103 PID 3376 wrote to memory of 1352 3376 cmd.exe 103 PID 3376 wrote to memory of 1352 3376 cmd.exe 103 PID 1964 wrote to memory of 4976 1964 Payment Slip (SWIFT)·PDF.scr 104 PID 1964 wrote to memory of 4976 1964 Payment Slip (SWIFT)·PDF.scr 104 PID 1964 wrote to memory of 4976 1964 Payment Slip (SWIFT)·PDF.scr 104 PID 1964 wrote to memory of 732 1964 Payment Slip (SWIFT)·PDF.scr 105 PID 1964 wrote to memory of 732 1964 Payment Slip (SWIFT)·PDF.scr 105 PID 1964 wrote to memory of 732 1964 Payment Slip (SWIFT)·PDF.scr 105 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 PID 1964 wrote to memory of 4196 1964 Payment Slip (SWIFT)·PDF.scr 106 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 AppLaunch.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip (SWIFT)·PDF.scr"C:\Users\Admin\AppData\Local\Temp\Payment Slip (SWIFT)·PDF.scr" /S1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:1352
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵PID:4976
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵PID:732
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4196
-