Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 09:30

General

  • Target

    489e95811f4464a98cb9c2ed1bccea96.exe

  • Size

    1.1MB

  • MD5

    489e95811f4464a98cb9c2ed1bccea96

  • SHA1

    f68b4a40405b598f92f1319af286735851340d3e

  • SHA256

    07f71531fb540881da4f829038da3222e3fea6c27b2aeecefb9208bca648daf8

  • SHA512

    0774ddeabd257c69822f4fbdeb836c0e02439a974d2a63a532d841893d02cbaf670f45a47a97b79ddf568756c6ad95e9c0be52e975712560638384af087a7201

  • SSDEEP

    24576:8AOcZ6JVYy0kWE8Q2Qe0E3fhNQXNmrK4VEZe:qhjT8Q2FOIrK+Es

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    secure219.inmotionhosting.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    7mgTt7O(h.O64J@

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\489e95811f4464a98cb9c2ed1bccea96.exe
    "C:\Users\Admin\AppData\Local\Temp\489e95811f4464a98cb9c2ed1bccea96.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif
      "C:\Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif" pfllofdnw.nfo
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2700
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • outlook_office_path
        • outlook_win_path
        PID:572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\84449387\pfllofdnw.nfo

    Filesize

    18.1MB

    MD5

    1378e30d8d942fdb1be0962b1b6799dc

    SHA1

    201b544ff50f2280c323be133e0b4fda9b1cb64b

    SHA256

    22c70566c976db96c95303651092e917a9280013ac78a31d3884ad05414675f3

    SHA512

    1e649f6cb067e669dc609e97a88f74db5a617ace38d87f66f0d0d104b0cb2aedbb719e76e18d178386b212f0cf6050e0dd239f88e6b849acd3710a66530334f8

  • C:\Users\Admin\AppData\Local\Temp\84449387\teuigc.bin

    Filesize

    471KB

    MD5

    c6f8960edc54314eb1106bd3d9a83725

    SHA1

    37728656e978b48d52b0bfe602203a2e08f77426

    SHA256

    38a4146e366adcc56b146c713d00754c81318a5f757b7d7be5f1cfbf900040ee

    SHA512

    d6886d4b93215294d1f6c1ba3a968364e562f0bee037be3efa3a121892c76b6dcd398a18d854d00ae587cf566c4a6922efc9b8ec4d06b5b57db34cae31e4f097

  • \Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif

    Filesize

    646KB

    MD5

    3ed1a8fc9740a4d01c10b953430742bb

    SHA1

    74fe1d5657c58c243f1813d0372a9ae39b1cbe71

    SHA256

    eea6eb595ff4ad15a7a141efed1b18cadddda4ce624ef1f88792612891ecb52a

    SHA512

    c457e87e4c7950f61c19276c77cc3dc6a6f6876b94c439713987cb186f3ba7fdeda55200e192b07d4152a1399020b9eea0da52740e38b58142c5fb8fe261224c

  • memory/572-67-0x00000000001F0000-0x0000000000723000-memory.dmp

    Filesize

    5.2MB

  • memory/572-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/572-69-0x00000000001F0000-0x0000000000723000-memory.dmp

    Filesize

    5.2MB

  • memory/572-71-0x00000000001F0000-0x0000000000723000-memory.dmp

    Filesize

    5.2MB

  • memory/572-73-0x00000000001F0000-0x0000000000723000-memory.dmp

    Filesize

    5.2MB

  • memory/572-74-0x00000000001F0000-0x000000000022C000-memory.dmp

    Filesize

    240KB

  • memory/572-75-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB

  • memory/572-76-0x0000000004F20000-0x0000000004F60000-memory.dmp

    Filesize

    256KB

  • memory/572-77-0x00000000743B0000-0x0000000074A9E000-memory.dmp

    Filesize

    6.9MB