Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT OF OUTSTANDING BILLS.pdf.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
PAYMENT OF OUTSTANDING BILLS.pdf.exe
Resource
win10v2004-20230915-en
General
-
Target
PAYMENT OF OUTSTANDING BILLS.pdf.exe
-
Size
644KB
-
MD5
432c2dd84816f93dcb064c273e51fe60
-
SHA1
6c3c24235db1b66bf265ea3b103a592a5291d44e
-
SHA256
721ca582a7a8e00d9421c1acaa52906cfe9219cb13be9646b713462e48198c54
-
SHA512
ee04fbc1756eecc5907fbcda3003ccabaaf1244e20ee6296115e42979df6fcae67a35ccfc2fb995d3ce5f4f37da81892e41bf0ddf277056d038c01b728a69695
-
SSDEEP
12288:KURF2iNqUCemnN5t3xUIa0bwol55hsqkMTVIAqXvfIKWOr8JCsBJ1D7j2mEVLIE:KCF14WmrjUtoVhsqkMVIpvAKb4teREE
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6170712575:AAElPWnx5Qa6DM6VEbCF2EKyxvGg9piYKdM/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation PAYMENT OF OUTSTANDING BILLS.pdf.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PAYMENT OF OUTSTANDING BILLS.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PAYMENT OF OUTSTANDING BILLS.pdf.exe Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PAYMENT OF OUTSTANDING BILLS.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1148 set thread context of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4080 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1868 PAYMENT OF OUTSTANDING BILLS.pdf.exe 1868 PAYMENT OF OUTSTANDING BILLS.pdf.exe 1548 powershell.exe 1548 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 1868 PAYMENT OF OUTSTANDING BILLS.pdf.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1148 wrote to memory of 1548 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 101 PID 1148 wrote to memory of 1548 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 101 PID 1148 wrote to memory of 1548 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 101 PID 1148 wrote to memory of 4080 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 103 PID 1148 wrote to memory of 4080 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 103 PID 1148 wrote to memory of 4080 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 103 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 PID 1148 wrote to memory of 1868 1148 PAYMENT OF OUTSTANDING BILLS.pdf.exe 105 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PAYMENT OF OUTSTANDING BILLS.pdf.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PAYMENT OF OUTSTANDING BILLS.pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT OF OUTSTANDING BILLS.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT OF OUTSTANDING BILLS.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Qigahd.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\Qigahd" /XML "C:\Users\Admin\AppData\Local\Temp\tmp71DF.tmp"2⤵
- Creates scheduled task(s)
PID:4080
-
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT OF OUTSTANDING BILLS.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT OF OUTSTANDING BILLS.pdf.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\PAYMENT OF OUTSTANDING BILLS.pdf.exe.log
Filesize1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD532a95bcdda892d4f0b7e573d734cc35f
SHA1c03a420a7d881d4269b639cc2463c475dd65e68c
SHA256d88d22c3c1053d09b828daff1a1d7a884862ef1641d4a9daf5ece887c78f1c72
SHA51206701e09332a8306aa8d81b33bf27ec3124cd8c8a3ba97e540a120edcf414fdc3a3f6ab3912191739472c9e0c74dd4692566b47f35d9241859c6e1d236c5ec19