Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
23/10/2023, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT COPY.pdf.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
PAYMENT COPY.pdf.exe
Resource
win10v2004-20231020-en
General
-
Target
PAYMENT COPY.pdf.exe
-
Size
1021KB
-
MD5
28707370a3fb75269da8a9da30960505
-
SHA1
9c900e8ca6595599e922bce6f3255f29063d6212
-
SHA256
d49cff946605d03af069b896354b114d8a4b87313c1aa7fcac9fbf71bb39f8c1
-
SHA512
1ceb51a47825143cce7c0826e3d378b639621972996d6b0f7af772837852a0c00fc6f671f9c8642e2372e6b8118e43596f654073134681ca3958fba62be7f44f
-
SSDEEP
12288:uF0rdOBhhxlh/VJ1euMQd+S8Q/ZNt4/NpUH:00QdxTVJEuMPSDxNt+
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.expertsconsultgh.co - Port:
587 - Username:
[email protected] - Password:
Oppong.2012 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2552 set thread context of 580 2552 PAYMENT COPY.pdf.exe 38 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2552 PAYMENT COPY.pdf.exe 2816 powershell.exe 2872 powershell.exe 2552 PAYMENT COPY.pdf.exe 580 RegSvcs.exe 580 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2552 PAYMENT COPY.pdf.exe Token: SeDebugPrivilege 2816 powershell.exe Token: SeDebugPrivilege 2872 powershell.exe Token: SeDebugPrivilege 580 RegSvcs.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 2552 wrote to memory of 2872 2552 PAYMENT COPY.pdf.exe 30 PID 2552 wrote to memory of 2872 2552 PAYMENT COPY.pdf.exe 30 PID 2552 wrote to memory of 2872 2552 PAYMENT COPY.pdf.exe 30 PID 2552 wrote to memory of 2872 2552 PAYMENT COPY.pdf.exe 30 PID 2552 wrote to memory of 2816 2552 PAYMENT COPY.pdf.exe 32 PID 2552 wrote to memory of 2816 2552 PAYMENT COPY.pdf.exe 32 PID 2552 wrote to memory of 2816 2552 PAYMENT COPY.pdf.exe 32 PID 2552 wrote to memory of 2816 2552 PAYMENT COPY.pdf.exe 32 PID 2552 wrote to memory of 2608 2552 PAYMENT COPY.pdf.exe 33 PID 2552 wrote to memory of 2608 2552 PAYMENT COPY.pdf.exe 33 PID 2552 wrote to memory of 2608 2552 PAYMENT COPY.pdf.exe 33 PID 2552 wrote to memory of 2608 2552 PAYMENT COPY.pdf.exe 33 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2656 2552 PAYMENT COPY.pdf.exe 36 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 2448 2552 PAYMENT COPY.pdf.exe 37 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 3056 2552 PAYMENT COPY.pdf.exe 39 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 PID 2552 wrote to memory of 580 2552 PAYMENT COPY.pdf.exe 38 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3837739534-3148647840-3445085216-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PAYMENT COPY.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\oVRCbYZ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\oVRCbYZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp384F.tmp"2⤵
- Creates scheduled task(s)
PID:2608
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:580
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:3056
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD525ac16059e6fc048f51f44466e221d54
SHA1083f0a4b1383807959d620d73f243e85a04e1cfa
SHA2569476593cfe78f81f9931455d1f3590f2262e275932af75fd6c0ede4b20417083
SHA512ed9f21b7aca352c241e30c5fe7a69858d18ff4dbc2a3e23cd3368683965875f6c7679b3057e5bbefde06060c0b3d05018250c8d5f469f63fb26ffd65931532d7
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0NF3K6AA2AWT3K2VUCXO.temp
Filesize7KB
MD58c292f882fde699d15f060081372b90f
SHA102a0510744b4f293f5700c98df10e4acd4e3b26e
SHA2560cf020c5149c7fafc8d485717be9ffe962186a855cbc6d0ae46fa14112ddc5e1
SHA5123daa1ea52f802f34891d0eb78d1d9105a16a2168a49b00e10e05183edce09bc8d90fd849024889baf045b2f604436721392eeb9ff8916560f0d106b9f6a08e5c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD58c292f882fde699d15f060081372b90f
SHA102a0510744b4f293f5700c98df10e4acd4e3b26e
SHA2560cf020c5149c7fafc8d485717be9ffe962186a855cbc6d0ae46fa14112ddc5e1
SHA5123daa1ea52f802f34891d0eb78d1d9105a16a2168a49b00e10e05183edce09bc8d90fd849024889baf045b2f604436721392eeb9ff8916560f0d106b9f6a08e5c