Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2023, 10:25

General

  • Target

    POORD20231109001.exe

  • Size

    811KB

  • MD5

    8db3ac84bb799e2ebfdcfe5b8dedcd3d

  • SHA1

    f97e2ad47783757ff512426c15d4245a71b91b71

  • SHA256

    38f37394fb702ef0c171ad83d2e8d6fee51f859298560a0002b0945c8b6a7edd

  • SHA512

    3724b4c7c74eef87c613cd65ba8fb6ddb5386cd898ab3d14c69232a4030c7b6469200323cd98a6d311e5e5ffd08dcb83202a4abb2c8b84f86ded391f8123f4ad

  • SSDEEP

    12288:Y8ovJo2zmDUFNntnE/VtiiI/BFMabZiL/1bxmG0Z0BNMu1Y+53P7r9r/+ppppppp:3Wo2CDUFN5gVtvIZFMabq/xfrVSS31q

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 37 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe
    "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ToFNxh.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1796
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ToFNxh" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF8FF.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2720
    • C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe
      "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
      2⤵
        PID:2312
      • C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe
        "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
        2⤵
          PID:1268
        • C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe
          "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
          2⤵
            PID:2996
          • C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe
            "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
            2⤵
              PID:3028
            • C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe
              "C:\Users\Admin\AppData\Local\Temp\POORD20231109001.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:2672

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpF8FF.tmp

            Filesize

            1KB

            MD5

            3602fe1c37829dfc6780a9ed7ac5eccd

            SHA1

            2f494e827925f663f3563701f7a980090ead11f8

            SHA256

            46a48f802000e609b98c6268c5451f1ae53c702bade2985aa0702599feba45f4

            SHA512

            2c13d611519762c26a9c3161170f65e4ec330b23104508583f0b5fa5722b8d3e68987e96113d6218f101268b2b73ebd8406e5f423237b85d32062c679e9a66b5

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6S1H9G6N5UYBHP8867PS.temp

            Filesize

            7KB

            MD5

            5898b807e61393f57e4725aef3c950a5

            SHA1

            211301948b28fa424cd11ebd8cd097e5b9b2cadc

            SHA256

            7ff475a6bda1b5f8224bbf9254e22b4aa11ac7bf3b55d18a78d831e925f9c9c5

            SHA512

            34f175af20819c0e92878466ddb33f3182b5837b00ce09f2de290e74fb0bc86be9c9dbb53d0f91bf0b1552b35296c6b980ebc205ed3ed7ddef5c131565d9f179

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

            Filesize

            7KB

            MD5

            5898b807e61393f57e4725aef3c950a5

            SHA1

            211301948b28fa424cd11ebd8cd097e5b9b2cadc

            SHA256

            7ff475a6bda1b5f8224bbf9254e22b4aa11ac7bf3b55d18a78d831e925f9c9c5

            SHA512

            34f175af20819c0e92878466ddb33f3182b5837b00ce09f2de290e74fb0bc86be9c9dbb53d0f91bf0b1552b35296c6b980ebc205ed3ed7ddef5c131565d9f179

          • memory/1796-38-0x000000006F5C0000-0x000000006FB6B000-memory.dmp

            Filesize

            5.7MB

          • memory/1796-36-0x000000006F5C0000-0x000000006FB6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2672-31-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-40-0x0000000004B90000-0x0000000004BD0000-memory.dmp

            Filesize

            256KB

          • memory/2672-33-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-29-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-41-0x00000000749C0000-0x00000000750AE000-memory.dmp

            Filesize

            6.9MB

          • memory/2672-43-0x0000000004B90000-0x0000000004BD0000-memory.dmp

            Filesize

            256KB

          • memory/2672-44-0x00000000749C0000-0x00000000750AE000-memory.dmp

            Filesize

            6.9MB

          • memory/2672-22-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-21-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-23-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-25-0x0000000000400000-0x0000000000442000-memory.dmp

            Filesize

            264KB

          • memory/2672-27-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2728-35-0x000000006F5C0000-0x000000006FB6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2728-37-0x0000000001CC0000-0x0000000001D00000-memory.dmp

            Filesize

            256KB

          • memory/2728-42-0x0000000001CC0000-0x0000000001D00000-memory.dmp

            Filesize

            256KB

          • memory/2728-39-0x000000006F5C0000-0x000000006FB6B000-memory.dmp

            Filesize

            5.7MB

          • memory/2980-5-0x0000000000800000-0x000000000080A000-memory.dmp

            Filesize

            40KB

          • memory/2980-6-0x0000000004F30000-0x0000000004FAC000-memory.dmp

            Filesize

            496KB

          • memory/2980-0-0x00000000000F0000-0x00000000001C0000-memory.dmp

            Filesize

            832KB

          • memory/2980-8-0x00000000042C0000-0x0000000004300000-memory.dmp

            Filesize

            256KB

          • memory/2980-7-0x00000000749C0000-0x00000000750AE000-memory.dmp

            Filesize

            6.9MB

          • memory/2980-4-0x00000000007F0000-0x00000000007F8000-memory.dmp

            Filesize

            32KB

          • memory/2980-3-0x00000000004F0000-0x0000000000502000-memory.dmp

            Filesize

            72KB

          • memory/2980-34-0x00000000749C0000-0x00000000750AE000-memory.dmp

            Filesize

            6.9MB

          • memory/2980-2-0x00000000042C0000-0x0000000004300000-memory.dmp

            Filesize

            256KB

          • memory/2980-1-0x00000000749C0000-0x00000000750AE000-memory.dmp

            Filesize

            6.9MB