Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
18/11/2023, 02:48
Static task
static1
Behavioral task
behavioral1
Sample
INV and PAK.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
INV and PAK.exe
Resource
win10v2004-20231020-en
General
-
Target
INV and PAK.exe
-
Size
884KB
-
MD5
7407a2849f0a33f95b2b27b48415e9be
-
SHA1
8544e9fdc67a0635c155756eb346080b61c6f4a0
-
SHA256
3c5e1993db8f454b72132cc7dd4b9180dccaa415b2fa9d0c8d55f768ebeffab4
-
SHA512
df28bafd79322959c6644246211d7dfb120f6b820fecc94e883f6f3efbb5fcc564574dfdcb068c1accd906fcf99ce73495ab374c530941d0290d375bafcffef7
-
SSDEEP
12288:hO71EuPUpEZA/jGrOrt5KC4uvBHWwWvtmLMdhovYOtk3Gr:ha1XUpE2GrcXKCFWwWv0vG
Malware Config
Extracted
Protocol: smtp- Host:
mail.premiermotor.com.bn - Port:
587 - Username:
[email protected] - Password:
e3Q9hj?1
Extracted
agenttesla
Protocol: smtp- Host:
mail.premiermotor.com.bn - Port:
587 - Username:
[email protected] - Password:
e3Q9hj?1 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation INV and PAK.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HqAJrII = "C:\\Users\\Admin\\AppData\\Roaming\\HqAJrII\\HqAJrII.exe" INV and PAK.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 64 api.ipify.org 65 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 368 set thread context of 564 368 INV and PAK.exe 109 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 368 INV and PAK.exe 2708 powershell.exe 2708 powershell.exe 376 powershell.exe 376 powershell.exe 368 INV and PAK.exe 368 INV and PAK.exe 564 INV and PAK.exe 564 INV and PAK.exe 564 INV and PAK.exe 376 powershell.exe 2708 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 368 INV and PAK.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeDebugPrivilege 2708 powershell.exe Token: SeDebugPrivilege 564 INV and PAK.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 368 wrote to memory of 376 368 INV and PAK.exe 103 PID 368 wrote to memory of 376 368 INV and PAK.exe 103 PID 368 wrote to memory of 376 368 INV and PAK.exe 103 PID 368 wrote to memory of 2708 368 INV and PAK.exe 105 PID 368 wrote to memory of 2708 368 INV and PAK.exe 105 PID 368 wrote to memory of 2708 368 INV and PAK.exe 105 PID 368 wrote to memory of 4772 368 INV and PAK.exe 107 PID 368 wrote to memory of 4772 368 INV and PAK.exe 107 PID 368 wrote to memory of 4772 368 INV and PAK.exe 107 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109 PID 368 wrote to memory of 564 368 INV and PAK.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV and PAK.exe"C:\Users\Admin\AppData\Local\Temp\INV and PAK.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\INV and PAK.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uqumkjYYrsC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uqumkjYYrsC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5EB5.tmp"2⤵
- Creates scheduled task(s)
PID:4772
-
-
C:\Users\Admin\AppData\Local\Temp\INV and PAK.exe"C:\Users\Admin\AppData\Local\Temp\INV and PAK.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD5942d86b4712d23b8452060b0b0acea05
SHA183b7ae7e71bef4024c80025a131adbcc75e8c11c
SHA2565237ae0d3e5c6633a3eaba82f5b40cf07987b3ca888898df9cf2773a9bc91aba
SHA512dc7a04ea60d576b484f3ca55a646fcd4d8e5df0bfe80e0e130097d90ba41a25206b5a814117d4f388b6a89d766f5e7a8ee118303f3e21cbf27fb2eb15280e791
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ba0d79030bfafad03bfc4d7b739307f1
SHA14e2bfbc6d8ec8af65c92156bf8e0d16868df0137
SHA256af87413d99f2cd695a6cde23c57b36aa6cc39daf690c97437d0ab553a5176838
SHA512d9d344047e4e0c1a9480d4b6c88325a059de1eabb6acc61fc72c24dea54b2f424e9156b3f977b5477aa470fd977db9921974a36749ef2305bb01b4de647fd156