Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    282s
  • max time network
    292s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/11/2023, 08:28

General

  • Target

    IMG_4517053111.zip

  • Size

    5.8MB

  • MD5

    fc54dae351501f1bae4b44a538fc785d

  • SHA1

    60c766aa647a01adc67337acb932246b2aad567b

  • SHA256

    8c7efed8c12db6a810810197cbad0da9e66457a01bf04edebe871f6406425803

  • SHA512

    c22eb6cef1638449043c38b31b38f23b89aa516a54e5468fcbb4a90c8495aa77a967b615cc9df1bef10dfc80c31f9f85b035aa54f2a1c0c3ca3218bb6d462871

  • SSDEEP

    98304:DiJRkYMienogByD2GlkhNV2VvQuK9at5g6CinwBnXSmVNBAKOHE5wq0L8O:ARkYMHpk2GlkNVgQAfdCiwRiOP9nU7

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6811423600:AAG2aeIaNsb7KhtKp1Js71i-PwGY1zN7uIg/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 64 IoCs
  • Drops startup file 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.exe
    C:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\IMG_4517053111.zip
    1⤵
      PID:4752
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3424
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\IMG_4517053111.js"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4152
        • C:\Windows\System32\wscript.exe
          "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js"
          2⤵
          • Blocklisted process makes network request
          • Drops startup file
          PID:3948
        • C:\Users\Admin\AppData\Local\Temp\aaad.exe
          "C:\Users\Admin\AppData\Local\Temp\aaad.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2232
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\IMG_4517053111.js"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4404
        • C:\Windows\System32\wscript.exe
          "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js"
          2⤵
          • Blocklisted process makes network request
          • Drops startup file
          PID:1616
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\IMG_4517053111.js"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4600
        • C:\Windows\System32\wscript.exe
          "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js"
          2⤵
          • Blocklisted process makes network request
          • Drops startup file
          PID:2112

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\aaad.exe

        Filesize

        234KB

        MD5

        6c6cee666da17c0043661cf2a0c56d6a

        SHA1

        9ca21a88e917d235b4fd923bc0bc8208af8c30ec

        SHA256

        25a4772b405adb2585dc19e528156f6907ce3f539d0bc85827419f93c320f5cc

        SHA512

        8bc9edfcc329b539dfce4490d2b7974b92517661caeb34cc16c941497cda982232db29f69714452ecda2614c9c669a31e7a9866c1619a0f4df5663eaa8daa335

      • C:\Users\Admin\AppData\Local\Temp\aaad.exe

        Filesize

        234KB

        MD5

        6c6cee666da17c0043661cf2a0c56d6a

        SHA1

        9ca21a88e917d235b4fd923bc0bc8208af8c30ec

        SHA256

        25a4772b405adb2585dc19e528156f6907ce3f539d0bc85827419f93c320f5cc

        SHA512

        8bc9edfcc329b539dfce4490d2b7974b92517661caeb34cc16c941497cda982232db29f69714452ecda2614c9c669a31e7a9866c1619a0f4df5663eaa8daa335

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OrEptoEwgL.js

        Filesize

        346KB

        MD5

        25c958cb7cc6fb32bdd9b3231ca96810

        SHA1

        014d9ed9586573cba40219996284a260d692f646

        SHA256

        5aa996194869704ddfb481c705bb5e80f0ab9a71568da650e4f9c3e270bf3d37

        SHA512

        966a48d38c3d035421fb7a74bc47779dc02b1e379007ed8cce53b10e718feaadddc636fbab94b8acc8ca97b7ac62b2cb717ee27ebd47c003b9c4e258ea307115

      • C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js

        Filesize

        346KB

        MD5

        25c958cb7cc6fb32bdd9b3231ca96810

        SHA1

        014d9ed9586573cba40219996284a260d692f646

        SHA256

        5aa996194869704ddfb481c705bb5e80f0ab9a71568da650e4f9c3e270bf3d37

        SHA512

        966a48d38c3d035421fb7a74bc47779dc02b1e379007ed8cce53b10e718feaadddc636fbab94b8acc8ca97b7ac62b2cb717ee27ebd47c003b9c4e258ea307115

      • C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js

        Filesize

        346KB

        MD5

        25c958cb7cc6fb32bdd9b3231ca96810

        SHA1

        014d9ed9586573cba40219996284a260d692f646

        SHA256

        5aa996194869704ddfb481c705bb5e80f0ab9a71568da650e4f9c3e270bf3d37

        SHA512

        966a48d38c3d035421fb7a74bc47779dc02b1e379007ed8cce53b10e718feaadddc636fbab94b8acc8ca97b7ac62b2cb717ee27ebd47c003b9c4e258ea307115

      • C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js

        Filesize

        346KB

        MD5

        25c958cb7cc6fb32bdd9b3231ca96810

        SHA1

        014d9ed9586573cba40219996284a260d692f646

        SHA256

        5aa996194869704ddfb481c705bb5e80f0ab9a71568da650e4f9c3e270bf3d37

        SHA512

        966a48d38c3d035421fb7a74bc47779dc02b1e379007ed8cce53b10e718feaadddc636fbab94b8acc8ca97b7ac62b2cb717ee27ebd47c003b9c4e258ea307115

      • C:\Users\Admin\AppData\Roaming\OrEptoEwgL.js

        Filesize

        346KB

        MD5

        25c958cb7cc6fb32bdd9b3231ca96810

        SHA1

        014d9ed9586573cba40219996284a260d692f646

        SHA256

        5aa996194869704ddfb481c705bb5e80f0ab9a71568da650e4f9c3e270bf3d37

        SHA512

        966a48d38c3d035421fb7a74bc47779dc02b1e379007ed8cce53b10e718feaadddc636fbab94b8acc8ca97b7ac62b2cb717ee27ebd47c003b9c4e258ea307115

      • memory/2232-13-0x0000000006630000-0x0000000006680000-memory.dmp

        Filesize

        320KB

      • memory/2232-14-0x0000000006720000-0x00000000067BC000-memory.dmp

        Filesize

        624KB

      • memory/2232-12-0x0000000005930000-0x0000000005996000-memory.dmp

        Filesize

        408KB

      • memory/2232-11-0x0000000005770000-0x0000000005780000-memory.dmp

        Filesize

        64KB

      • memory/2232-19-0x0000000006FD0000-0x0000000007062000-memory.dmp

        Filesize

        584KB

      • memory/2232-20-0x0000000006FB0000-0x0000000006FBA000-memory.dmp

        Filesize

        40KB

      • memory/2232-21-0x0000000073E60000-0x000000007454E000-memory.dmp

        Filesize

        6.9MB

      • memory/2232-22-0x0000000005770000-0x0000000005780000-memory.dmp

        Filesize

        64KB

      • memory/2232-10-0x0000000005CC0000-0x00000000061BE000-memory.dmp

        Filesize

        5.0MB

      • memory/2232-9-0x0000000000F40000-0x0000000000F80000-memory.dmp

        Filesize

        256KB

      • memory/2232-8-0x0000000073E60000-0x000000007454E000-memory.dmp

        Filesize

        6.9MB