Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
08/12/2023, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe
Resource
win10v2004-20231127-en
General
-
Target
ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe
-
Size
682KB
-
MD5
55f2d796aae312c3ef0589c215749470
-
SHA1
151d39760a5318f483ccdcc9829fad5ac8afab52
-
SHA256
ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05
-
SHA512
e2e2d4699056203dcd2af6150e18727c6e54d3405504c5b5964a1f2f1f53c139d143d138395beede01886ab1a45e00fb72a65ae4e9238bf158289270767c3df8
-
SSDEEP
12288:GwFGHEnT8VJWMB5VmjFvK4Nk35wxcCMjHaylgimtdYM3O0V7bb:G5HEgVJj8jg4k5jCMjhlgZtub0V7
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.vvspijkenisse.nl - Port:
21 - Username:
[email protected] - Password:
playingboyz231
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Haglskadeforsikring\Miljankenvnet.ini ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2228 msbuild.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1632 powershell.exe 2228 msbuild.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1632 set thread context of 2228 1632 powershell.exe 31 -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\integraltegnets\substrate.Ski ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe File created C:\Program Files (x86)\cockling.lnk ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe File opened for modification C:\Program Files (x86)\cockling.lnk ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe File opened for modification C:\Program Files (x86)\Kldebonnets.kod ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\bagvognen.lnk ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe File opened for modification C:\Windows\Calottes.Doo ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe File opened for modification C:\Windows\bagvognen.lnk ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1632 powershell.exe 1632 powershell.exe 1632 powershell.exe 1632 powershell.exe 1632 powershell.exe 1632 powershell.exe 1632 powershell.exe 2228 msbuild.exe 2228 msbuild.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1632 powershell.exe Token: SeDebugPrivilege 2228 msbuild.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2000 wrote to memory of 1632 2000 ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe 28 PID 2000 wrote to memory of 1632 2000 ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe 28 PID 2000 wrote to memory of 1632 2000 ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe 28 PID 2000 wrote to memory of 1632 2000 ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe 28 PID 1632 wrote to memory of 2228 1632 powershell.exe 31 PID 1632 wrote to memory of 2228 1632 powershell.exe 31 PID 1632 wrote to memory of 2228 1632 powershell.exe 31 PID 1632 wrote to memory of 2228 1632 powershell.exe 31 PID 1632 wrote to memory of 2228 1632 powershell.exe 31 PID 1632 wrote to memory of 2228 1632 powershell.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe"C:\Users\Admin\AppData\Local\Temp\ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe"1⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Induktion=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Sideordnes\Mellilita.Flu';$Evaporeringen139=$Induktion.SubString(50194,3);.$Evaporeringen139($Induktion)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"3⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32B
MD5a8ca1db6ae34f5e5c152094f44f92476
SHA19fe0fd4e6907c4f9099d2533c3bade4ffa0968e7
SHA2561f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3
SHA512e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a
-
Filesize
272KB
MD507680313c03d4287ff1b4976923d41f5
SHA101b440609e243762c5f8fefb97a73625e5ba2d4d
SHA256a0a14bede619d41b689f53f9fad93517f0524167d23c246488d825cb18596c2f
SHA5122bc17abbeee9d106e08302ba542e5e51b30664f5419c12b0d6551355fd72f26bf063771e7f9d9f92eda2349db026ee0362fcfba7f61e5a5ce985e06d429b9569
-
Filesize
49KB
MD54f519227d8762ab4a41ce7b824a05c7d
SHA15bec609db12c8880186abafc97eb21cad74e8366
SHA2566e1b981cbce77169cfb154d3ad563a41bc9d7afa552798380bfc1133d72a0e88
SHA5127a497b096b08521566628c56c98712ab204e40db73a255b9aee993bbf23dd799894d3929b8c0decb76c7ee679d9c4698ad6ffffe77ff6715bd586f1582a93bdd