Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
SWIFT COPY.pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SWIFT COPY.pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
SWIFT COPY.pdf.exe
-
Size
519KB
-
MD5
9fcf21603085f607c7a635ca03d8b91c
-
SHA1
ea113d8f9332eb31330d13d1b4c2e2a165f5dccc
-
SHA256
0b675485123aef301b8f33a5ebca2b1dfb12c7bffcdc7331dc16615c9d6b0495
-
SHA512
fc2096b88af2dcea1c87d276b3b07d2cbf44e4508f33d6513802ead833c950a29f4ada486c840b0b1a9ae2418c14bf931cc6a2aa213e6fb2ca9f34981c5d01c6
-
SSDEEP
12288:un2yaWZp7RBGDaSV0lO3jJukZW2WaKYEDbA18WFDtlu1HCu:4fBGOSV0lOVAtYE/+BDtl
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.expertsconsultgh.co - Port:
587 - Username:
[email protected] - Password:
Oppong.2012 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2024 set thread context of 2544 2024 SWIFT COPY.pdf.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2024 SWIFT COPY.pdf.exe 2024 SWIFT COPY.pdf.exe 2624 powershell.exe 2760 powershell.exe 2024 SWIFT COPY.pdf.exe 2544 RegSvcs.exe 2544 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2024 SWIFT COPY.pdf.exe Token: SeDebugPrivilege 2624 powershell.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeDebugPrivilege 2544 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2624 2024 SWIFT COPY.pdf.exe 30 PID 2024 wrote to memory of 2624 2024 SWIFT COPY.pdf.exe 30 PID 2024 wrote to memory of 2624 2024 SWIFT COPY.pdf.exe 30 PID 2024 wrote to memory of 2624 2024 SWIFT COPY.pdf.exe 30 PID 2024 wrote to memory of 2760 2024 SWIFT COPY.pdf.exe 32 PID 2024 wrote to memory of 2760 2024 SWIFT COPY.pdf.exe 32 PID 2024 wrote to memory of 2760 2024 SWIFT COPY.pdf.exe 32 PID 2024 wrote to memory of 2760 2024 SWIFT COPY.pdf.exe 32 PID 2024 wrote to memory of 2824 2024 SWIFT COPY.pdf.exe 34 PID 2024 wrote to memory of 2824 2024 SWIFT COPY.pdf.exe 34 PID 2024 wrote to memory of 2824 2024 SWIFT COPY.pdf.exe 34 PID 2024 wrote to memory of 2824 2024 SWIFT COPY.pdf.exe 34 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 PID 2024 wrote to memory of 2544 2024 SWIFT COPY.pdf.exe 36 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.pdf.exe"C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SWIFT COPY.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\JSaNwejETrW.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2760
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\JSaNwejETrW" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFAC3.tmp"2⤵
- Creates scheduled task(s)
PID:2824
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5de3c3f55c5750340b7c08645ed0233d8
SHA1dd7630f7d540820b7186c880bdffeba89c39b5a9
SHA256477f28cf564fd8b69f7a0e8527f7c5fe3a17f996ca01bd7c36df6e28614ebe88
SHA5128f82ed0b80b676c7b8f31902b1e85a3ad869dce7d3295eb5aa764dedcae592a038a969deb5f8cc9d0b5d700ef1f877755a34e5e2551a4c0c701e4ae4b3e29f48
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9YVIU9WYCMBG9LCA3LTJ.temp
Filesize7KB
MD5f199f89176b14fe108319b43243c6fea
SHA16026d346efaca97a84e50f86fdbffcae3bd72c7b
SHA256b8a2cab9f785e92a1b4cf1413d82177f5a301f23e720bfeccf1ee369a239675d
SHA512e1ba1648563f618745a39733a3441139b7b8b153cf9c3793c9ba7848b1521d6e7e33e37cc07d4dab867c7c15f5b195b2afa6efa7e6795c747b57e7c2a660aac6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5f199f89176b14fe108319b43243c6fea
SHA16026d346efaca97a84e50f86fdbffcae3bd72c7b
SHA256b8a2cab9f785e92a1b4cf1413d82177f5a301f23e720bfeccf1ee369a239675d
SHA512e1ba1648563f618745a39733a3441139b7b8b153cf9c3793c9ba7848b1521d6e7e33e37cc07d4dab867c7c15f5b195b2afa6efa7e6795c747b57e7c2a660aac6