Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
86s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 17:46
Static task
static1
Behavioral task
behavioral1
Sample
invoice overdue.pdf.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
invoice overdue.pdf.exe
Resource
win10v2004-20231020-en
General
-
Target
invoice overdue.pdf.exe
-
Size
953KB
-
MD5
3c288f869290db9a0a736599823e837e
-
SHA1
6ac8d55163b018275e32d7478f12b41926e48268
-
SHA256
f112d1e7c8414255846131a14109ae12e45ad65296bd014601d0a83c9ea90cb2
-
SHA512
ebf3d226026059c053b5787f293e7d1b7c89c56ebe1ce13d0a43b1c235e73537302b3f9a8d267257f88128a7fff5380a838efc7544e27446ad86e049a6f7e916
-
SSDEEP
12288:/IL5VcLYuPliBSpZAWzpNHP1MBkw9Jj6kKAQQtmxIlL5cjQUgjW9WB/P7r9r/+pj:85Oj1ZAWr4Jj6vA7UIh5cjojEC1q
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bezzleauto.com - Port:
587 - Username:
[email protected] - Password:
kex#-rHjHM4qKk52 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation invoice overdue.pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4748 set thread context of 4824 4748 invoice overdue.pdf.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2316 4824 WerFault.exe 105 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3996 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 3920 powershell.exe 3920 powershell.exe 4748 invoice overdue.pdf.exe 4748 invoice overdue.pdf.exe 3352 powershell.exe 3352 powershell.exe 4824 RegSvcs.exe 4824 RegSvcs.exe 4824 RegSvcs.exe 3920 powershell.exe 3352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3920 powershell.exe Token: SeDebugPrivilege 4748 invoice overdue.pdf.exe Token: SeDebugPrivilege 3352 powershell.exe Token: SeDebugPrivilege 4824 RegSvcs.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 4748 wrote to memory of 3920 4748 invoice overdue.pdf.exe 98 PID 4748 wrote to memory of 3920 4748 invoice overdue.pdf.exe 98 PID 4748 wrote to memory of 3920 4748 invoice overdue.pdf.exe 98 PID 4748 wrote to memory of 3352 4748 invoice overdue.pdf.exe 100 PID 4748 wrote to memory of 3352 4748 invoice overdue.pdf.exe 100 PID 4748 wrote to memory of 3352 4748 invoice overdue.pdf.exe 100 PID 4748 wrote to memory of 3996 4748 invoice overdue.pdf.exe 102 PID 4748 wrote to memory of 3996 4748 invoice overdue.pdf.exe 102 PID 4748 wrote to memory of 3996 4748 invoice overdue.pdf.exe 102 PID 4748 wrote to memory of 2364 4748 invoice overdue.pdf.exe 104 PID 4748 wrote to memory of 2364 4748 invoice overdue.pdf.exe 104 PID 4748 wrote to memory of 2364 4748 invoice overdue.pdf.exe 104 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105 PID 4748 wrote to memory of 4824 4748 invoice overdue.pdf.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\invoice overdue.pdf.exe"C:\Users\Admin\AppData\Local\Temp\invoice overdue.pdf.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\invoice overdue.pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\QTnzvEWuuI.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QTnzvEWuuI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD3AB.tmp"2⤵
- Creates scheduled task(s)
PID:3996
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵PID:2364
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4824 -s 14043⤵
- Program crash
PID:2316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4824 -ip 48241⤵PID:1452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD550ba42152caac00f09cc944e982b4af9
SHA184b96513f18458f01662fe24cd902dd7f11539b1
SHA25631f7957ddc4f291c0144efbbb69453d0b56976e7831b1ad473d3503952fa9b66
SHA5127c2586d465b03a9a4fb1e89eff6d803e46d093c41c4122eec7b03904dee651666e93cf57800475a92382d02ff54c1020a69db5f079c6e3c5180ecba3cf968f20
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD51ddd815ac79925ee5edfb3bd7b6b6804
SHA15cdf97cb78de58f328ef92e05313d5b47bfd84b4
SHA25610f86a712d918e936ef96e8865edccac1d0418d614c5386b8d07b5a9938e60a9
SHA512f876ba20e63053ce158a80d0324c911b60921ff99b6ba5ce966fd99cfc41c34f8f73021bf2fa06befa3b92e08241bd0480719b215eff5f7132f89c13b22062fc