Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
1649e10c12e3b6242ac80048b6623683.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1649e10c12e3b6242ac80048b6623683.exe
Resource
win10v2004-20231215-en
General
-
Target
1649e10c12e3b6242ac80048b6623683.exe
-
Size
1.4MB
-
MD5
1649e10c12e3b6242ac80048b6623683
-
SHA1
14a200da1c85b80e688673fcc26f4ac21cf9a6fe
-
SHA256
2d310d80e32cf06ccf6cc5e63e542283bc9a301a31215030733a1f733b0d2346
-
SHA512
db5905abd5caf3027d06b513cc3b590a27b090817b0e3deae03abb1f51778481cdf724e202a02f39a12847c72fb3e907aa074de74a00d1130a93f2a19677fb92
-
SSDEEP
24576:adOTNGD7beQ6fsJcPvKVdtNFS/E+FH/T2fXO:0qU9uknSL/T2/
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot1775909572:AAGbTnqPuJBAUZrgQhid9SmcxSSNElS3rh8/sendDocument
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral2/memory/3376-37-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3276 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"1⤵PID:220
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LosJvWlPQthlo" /XML "C:\Users\Admin\AppData\Local\Temp\tmp13F0.tmp"2⤵
- Creates scheduled task(s)
PID:3276
-
-
C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"2⤵PID:3376
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LosJvWlPQthlo.exe"2⤵PID:5080
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LosJvWlPQthlo.exe"2⤵PID:2108
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\1649e10c12e3b6242ac80048b6623683.exe"2⤵PID:2672
-