Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
489e95811f4464a98cb9c2ed1bccea96.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
489e95811f4464a98cb9c2ed1bccea96.exe
Resource
win10v2004-20231222-en
General
-
Target
489e95811f4464a98cb9c2ed1bccea96.exe
-
Size
1.1MB
-
MD5
489e95811f4464a98cb9c2ed1bccea96
-
SHA1
f68b4a40405b598f92f1319af286735851340d3e
-
SHA256
07f71531fb540881da4f829038da3222e3fea6c27b2aeecefb9208bca648daf8
-
SHA512
0774ddeabd257c69822f4fbdeb836c0e02439a974d2a63a532d841893d02cbaf670f45a47a97b79ddf568756c6ad95e9c0be52e975712560638384af087a7201
-
SSDEEP
24576:8AOcZ6JVYy0kWE8Q2Qe0E3fhNQXNmrK4VEZe:qhjT8Q2FOIrK+Es
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
secure219.inmotionhosting.com - Port:
587 - Username:
[email protected] - Password:
7mgTt7O(h.O64J@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/572-69-0x00000000001F0000-0x0000000000723000-memory.dmp family_agenttesla behavioral1/memory/572-71-0x00000000001F0000-0x0000000000723000-memory.dmp family_agenttesla behavioral1/memory/572-73-0x00000000001F0000-0x0000000000723000-memory.dmp family_agenttesla behavioral1/memory/572-74-0x00000000001F0000-0x000000000022C000-memory.dmp family_agenttesla behavioral1/memory/572-76-0x0000000004F20000-0x0000000004F60000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 2700 ofilnbjgki.pif -
Loads dropped DLL 4 IoCs
pid Process 1064 489e95811f4464a98cb9c2ed1bccea96.exe 1064 489e95811f4464a98cb9c2ed1bccea96.exe 1064 489e95811f4464a98cb9c2ed1bccea96.exe 1064 489e95811f4464a98cb9c2ed1bccea96.exe -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2700 set thread context of 572 2700 ofilnbjgki.pif 29 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 572 RegSvcs.exe 572 RegSvcs.exe 572 RegSvcs.exe 572 RegSvcs.exe 572 RegSvcs.exe 572 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 572 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 572 RegSvcs.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2700 1064 489e95811f4464a98cb9c2ed1bccea96.exe 28 PID 1064 wrote to memory of 2700 1064 489e95811f4464a98cb9c2ed1bccea96.exe 28 PID 1064 wrote to memory of 2700 1064 489e95811f4464a98cb9c2ed1bccea96.exe 28 PID 1064 wrote to memory of 2700 1064 489e95811f4464a98cb9c2ed1bccea96.exe 28 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 PID 2700 wrote to memory of 572 2700 ofilnbjgki.pif 29 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\489e95811f4464a98cb9c2ed1bccea96.exe"C:\Users\Admin\AppData\Local\Temp\489e95811f4464a98cb9c2ed1bccea96.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif"C:\Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif" pfllofdnw.nfo2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18.1MB
MD51378e30d8d942fdb1be0962b1b6799dc
SHA1201b544ff50f2280c323be133e0b4fda9b1cb64b
SHA25622c70566c976db96c95303651092e917a9280013ac78a31d3884ad05414675f3
SHA5121e649f6cb067e669dc609e97a88f74db5a617ace38d87f66f0d0d104b0cb2aedbb719e76e18d178386b212f0cf6050e0dd239f88e6b849acd3710a66530334f8
-
Filesize
471KB
MD5c6f8960edc54314eb1106bd3d9a83725
SHA137728656e978b48d52b0bfe602203a2e08f77426
SHA25638a4146e366adcc56b146c713d00754c81318a5f757b7d7be5f1cfbf900040ee
SHA512d6886d4b93215294d1f6c1ba3a968364e562f0bee037be3efa3a121892c76b6dcd398a18d854d00ae587cf566c4a6922efc9b8ec4d06b5b57db34cae31e4f097
-
Filesize
646KB
MD53ed1a8fc9740a4d01c10b953430742bb
SHA174fe1d5657c58c243f1813d0372a9ae39b1cbe71
SHA256eea6eb595ff4ad15a7a141efed1b18cadddda4ce624ef1f88792612891ecb52a
SHA512c457e87e4c7950f61c19276c77cc3dc6a6f6876b94c439713987cb186f3ba7fdeda55200e192b07d4152a1399020b9eea0da52740e38b58142c5fb8fe261224c