Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

06/11/2023, 19:37

231106-ybwfxadf81 10

06/11/2023, 19:33

231106-x9tjjadf4z 10

06/11/2023, 16:18

231106-tr58tscc9y 10

Analysis

  • max time kernel
    320s
  • max time network
    874s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06/11/2023, 19:37

General

  • Target

    1106-03-AgentTesla.exe

  • Size

    700KB

  • MD5

    5b61637836afea5019078c8841f39712

  • SHA1

    061befc3ad783a590cb6e408062f8b2291c7b12f

  • SHA256

    8f3ed9c86757d9adaf489ce86c6ac422240af48f5c109807b31b3646b67d9757

  • SHA512

    c025a05bde0a92a785f470f74f33a8e30ba93edbcf026b05cbabbe1c7f884508829a418d8b1f5762b2769abb80a799e82add5eefb8ed75be66110185b7e139f5

  • SSDEEP

    12288:vwgJjWP9lZtDKIcXY4mnTwwlJk15TsVuhk37F1VoKc8XUbsS:PkDDKIcSEwEQVu237VoKc8X+

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    us2.smtp.mailhostbox.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    cash@com12345cash@com12345

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe
    "C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\PkhbHYvHHp.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4904
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\PkhbHYvHHp" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFCEE.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:4204
    • C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe
      "C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe"
      2⤵
        PID:4892
      • C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe
        "C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe"
        2⤵
          PID:1132
        • C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe
          "C:\Users\Admin\AppData\Local\Temp\1106-03-AgentTesla.exe"
          2⤵
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4512

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\1106-03-AgentTesla.exe.log

        Filesize

        1KB

        MD5

        0c2899d7c6746f42d5bbe088c777f94c

        SHA1

        622f66c5f7a3c91b28a9f43ce7c6cabadbf514f1

        SHA256

        5b0b99740cadaeff7b9891136644b396941547e20cc7eea646560d0dad5a5458

        SHA512

        ab7a3409ed4b6ca00358330a3aa4ef6de7d81eb21a5e24bb629ef6a7c7c4e2a70ca3accfbc989ed6e495fdb8eb6203a26d6f2a37b2a5809af4276af375b49078

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0gsmy1ve.yyk.ps1

        Filesize

        1B

        MD5

        c4ca4238a0b923820dcc509a6f75849b

        SHA1

        356a192b7913b04c54574d18c28d46e6395428ab

        SHA256

        6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

        SHA512

        4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

      • C:\Users\Admin\AppData\Local\Temp\tmpFCEE.tmp

        Filesize

        1KB

        MD5

        2ee07b1578e28039e3850ecd3871ef24

        SHA1

        8ac56dccf4be6920ba4e71f6cb2ef2c2cac70d56

        SHA256

        452ee390bd1b463baa3c061223546f0b8770265cbc08fb9c45b08b68384e3752

        SHA512

        e0b718ed3f5e2cfd6b7468a7ae5834a145ff3748e8828d87fb69d62a9ba05ec5c2fcd5351631712006a2ef24456066ff8241143804572ffaa4f7a7a33640a5de

      • C:\Users\Admin\AppData\Roaming\Micosoft Excel 2023\Micosoft Excel 2023.exe

        Filesize

        700KB

        MD5

        5b61637836afea5019078c8841f39712

        SHA1

        061befc3ad783a590cb6e408062f8b2291c7b12f

        SHA256

        8f3ed9c86757d9adaf489ce86c6ac422240af48f5c109807b31b3646b67d9757

        SHA512

        c025a05bde0a92a785f470f74f33a8e30ba93edbcf026b05cbabbe1c7f884508829a418d8b1f5762b2769abb80a799e82add5eefb8ed75be66110185b7e139f5

      • memory/2436-4-0x00000000055B0000-0x00000000055C0000-memory.dmp

        Filesize

        64KB

      • memory/2436-5-0x00000000055E0000-0x00000000055EA000-memory.dmp

        Filesize

        40KB

      • memory/2436-6-0x0000000005840000-0x000000000584E000-memory.dmp

        Filesize

        56KB

      • memory/2436-7-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/2436-8-0x00000000055B0000-0x00000000055C0000-memory.dmp

        Filesize

        64KB

      • memory/2436-9-0x0000000005980000-0x000000000598A000-memory.dmp

        Filesize

        40KB

      • memory/2436-10-0x0000000008350000-0x00000000083CA000-memory.dmp

        Filesize

        488KB

      • memory/2436-11-0x000000000AB20000-0x000000000ABBC000-memory.dmp

        Filesize

        624KB

      • memory/2436-3-0x0000000005600000-0x0000000005692000-memory.dmp

        Filesize

        584KB

      • memory/2436-2-0x0000000005A60000-0x0000000005F5E000-memory.dmp

        Filesize

        5.0MB

      • memory/2436-0-0x0000000000CC0000-0x0000000000D76000-memory.dmp

        Filesize

        728KB

      • memory/2436-1-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/2436-28-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/4512-27-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/4512-23-0x0000000000400000-0x0000000000442000-memory.dmp

        Filesize

        264KB

      • memory/4512-284-0x0000000005830000-0x0000000005840000-memory.dmp

        Filesize

        64KB

      • memory/4512-283-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/4512-29-0x0000000005830000-0x0000000005840000-memory.dmp

        Filesize

        64KB

      • memory/4512-51-0x0000000006850000-0x00000000068A0000-memory.dmp

        Filesize

        320KB

      • memory/4512-30-0x0000000005A30000-0x0000000005A96000-memory.dmp

        Filesize

        408KB

      • memory/4904-32-0x0000000007020000-0x0000000007086000-memory.dmp

        Filesize

        408KB

      • memory/4904-58-0x0000000008F40000-0x0000000008F5E000-memory.dmp

        Filesize

        120KB

      • memory/4904-33-0x0000000007980000-0x0000000007CD0000-memory.dmp

        Filesize

        3.3MB

      • memory/4904-34-0x00000000078C0000-0x00000000078DC000-memory.dmp

        Filesize

        112KB

      • memory/4904-35-0x00000000082C0000-0x000000000830B000-memory.dmp

        Filesize

        300KB

      • memory/4904-36-0x0000000008020000-0x0000000008096000-memory.dmp

        Filesize

        472KB

      • memory/4904-20-0x00000000011C0000-0x00000000011D0000-memory.dmp

        Filesize

        64KB

      • memory/4904-19-0x0000000001110000-0x0000000001146000-memory.dmp

        Filesize

        216KB

      • memory/4904-22-0x00000000011C0000-0x00000000011D0000-memory.dmp

        Filesize

        64KB

      • memory/4904-56-0x0000000008F60000-0x0000000008F93000-memory.dmp

        Filesize

        204KB

      • memory/4904-57-0x0000000070360000-0x00000000703AB000-memory.dmp

        Filesize

        300KB

      • memory/4904-31-0x0000000006FF0000-0x0000000007012000-memory.dmp

        Filesize

        136KB

      • memory/4904-63-0x00000000090A0000-0x0000000009145000-memory.dmp

        Filesize

        660KB

      • memory/4904-64-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/4904-65-0x00000000011C0000-0x00000000011D0000-memory.dmp

        Filesize

        64KB

      • memory/4904-66-0x00000000094D0000-0x0000000009564000-memory.dmp

        Filesize

        592KB

      • memory/4904-243-0x00000000011C0000-0x00000000011D0000-memory.dmp

        Filesize

        64KB

      • memory/4904-245-0x00000000011C0000-0x00000000011D0000-memory.dmp

        Filesize

        64KB

      • memory/4904-261-0x0000000009430000-0x000000000944A000-memory.dmp

        Filesize

        104KB

      • memory/4904-266-0x0000000009410000-0x0000000009418000-memory.dmp

        Filesize

        32KB

      • memory/4904-282-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/4904-18-0x0000000073910000-0x0000000073FFE000-memory.dmp

        Filesize

        6.9MB

      • memory/4904-24-0x0000000007090000-0x00000000076B8000-memory.dmp

        Filesize

        6.2MB