Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 09:30
Static task
static1
Behavioral task
behavioral1
Sample
489e95811f4464a98cb9c2ed1bccea96.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
489e95811f4464a98cb9c2ed1bccea96.exe
Resource
win10v2004-20231222-en
General
-
Target
489e95811f4464a98cb9c2ed1bccea96.exe
-
Size
1.1MB
-
MD5
489e95811f4464a98cb9c2ed1bccea96
-
SHA1
f68b4a40405b598f92f1319af286735851340d3e
-
SHA256
07f71531fb540881da4f829038da3222e3fea6c27b2aeecefb9208bca648daf8
-
SHA512
0774ddeabd257c69822f4fbdeb836c0e02439a974d2a63a532d841893d02cbaf670f45a47a97b79ddf568756c6ad95e9c0be52e975712560638384af087a7201
-
SSDEEP
24576:8AOcZ6JVYy0kWE8Q2Qe0E3fhNQXNmrK4VEZe:qhjT8Q2FOIrK+Es
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
secure219.inmotionhosting.com - Port:
587 - Username:
[email protected] - Password:
7mgTt7O(h.O64J@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral2/memory/4372-58-0x0000000001300000-0x0000000001833000-memory.dmp family_agenttesla behavioral2/memory/4372-59-0x0000000001300000-0x000000000133C000-memory.dmp family_agenttesla -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 489e95811f4464a98cb9c2ed1bccea96.exe -
Executes dropped EXE 1 IoCs
pid Process 684 ofilnbjgki.pif -
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 684 set thread context of 4372 684 ofilnbjgki.pif 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe 4372 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4372 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4372 RegSvcs.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2248 wrote to memory of 684 2248 489e95811f4464a98cb9c2ed1bccea96.exe 91 PID 2248 wrote to memory of 684 2248 489e95811f4464a98cb9c2ed1bccea96.exe 91 PID 2248 wrote to memory of 684 2248 489e95811f4464a98cb9c2ed1bccea96.exe 91 PID 684 wrote to memory of 4372 684 ofilnbjgki.pif 100 PID 684 wrote to memory of 4372 684 ofilnbjgki.pif 100 PID 684 wrote to memory of 4372 684 ofilnbjgki.pif 100 PID 684 wrote to memory of 4372 684 ofilnbjgki.pif 100 PID 684 wrote to memory of 4372 684 ofilnbjgki.pif 100 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\489e95811f4464a98cb9c2ed1bccea96.exe"C:\Users\Admin\AppData\Local\Temp\489e95811f4464a98cb9c2ed1bccea96.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif"C:\Users\Admin\AppData\Local\Temp\84449387\ofilnbjgki.pif" pfllofdnw.nfo2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- outlook_office_path
- outlook_win_path
PID:4372
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
185KB
MD5c53f46bc24bd50b6c67013ec8d091319
SHA10d0fc9c63dd6b8dcb47827c3dab6cd2e8146854a
SHA2563e9f819de3e4efb896b3cc5251a077ee8a797f94323bcbdd27d51c198b0b722f
SHA512529f6dfe16cdfc8b1e28fbfb94eac66b0c888bdbb3120847bd0049ac8f04496ff49be791f2873c64eda96fbbedfbf2f66172d3b9e89f84a9b187ec924fba2929
-
Filesize
128KB
MD5ee39c6b9f2ec2f83b2cccc8e5e7f7b43
SHA10215ae4a2734fdc1f0203a9f6ca39fe4ced81f2f
SHA2564838394bbdd106da74ec8e288aa7030e835c44ef0560ad3351301c1abe14ff11
SHA5125a181ffd2ae94349c680a1d8ea3055842b01924a558c42c8c56ae24f816b79ea3d5bd9c416a71a0bb1cd15749c939007999b4a82b20d9a0868a811c45252631d
-
Filesize
471KB
MD5c6f8960edc54314eb1106bd3d9a83725
SHA137728656e978b48d52b0bfe602203a2e08f77426
SHA25638a4146e366adcc56b146c713d00754c81318a5f757b7d7be5f1cfbf900040ee
SHA512d6886d4b93215294d1f6c1ba3a968364e562f0bee037be3efa3a121892c76b6dcd398a18d854d00ae587cf566c4a6922efc9b8ec4d06b5b57db34cae31e4f097