Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 01:55
Static task
static1
Behavioral task
behavioral1
Sample
202401310009.exe
Resource
win7-20231215-en
General
-
Target
202401310009.exe
-
Size
156KB
-
MD5
0073882408ccaeaa4c77889b22c5546c
-
SHA1
97f7176f986536ba6b16a2e59e699884a446d27a
-
SHA256
17e2ea8ea355babc49d0b0f4a16aaffa3e7e3e97171668205247e16d8e5eb5b8
-
SHA512
752ea528b877d92dc88c165e80f4f7add2864f2bdf6f5e96bbcf04a9adf13ca092cf93271cd25083cb033d26b884a3f1fd5e030c7f56b22277cfbae85173f2d9
-
SSDEEP
3072:6dSf2JsfZu1RYPaqKy+P5KV8e2iVvA9HT+Xrlmh:JhDhD+PYye2iiHKrlm
Malware Config
Extracted
Protocol: smtp- Host:
mail.ozmetalsan.com.tr - Port:
587 - Username:
[email protected] - Password:
ikircicek4521
Extracted
agenttesla
Protocol: smtp- Host:
mail.ozmetalsan.com.tr - Port:
587 - Username:
[email protected] - Password:
ikircicek4521 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4512-3-0x00000000054B0000-0x000000000555C000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-4-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-5-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-7-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-9-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-11-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-13-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-15-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-19-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-21-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-17-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-27-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-35-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-39-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-41-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-43-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-51-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-57-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-63-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-61-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-67-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-65-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-59-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-55-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-53-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-49-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-47-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-45-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-37-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-33-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-31-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-29-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-25-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 behavioral2/memory/4512-23-0x00000000054B0000-0x0000000005555000-memory.dmp family_zgrat_v1 -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 202401310009.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 29 api.ipify.org 30 api.ipify.org 31 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4512 set thread context of 3728 4512 202401310009.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 444 ipconfig.exe 5116 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2552 powershell.exe 2552 powershell.exe 4512 202401310009.exe 4512 202401310009.exe 4512 202401310009.exe 4512 202401310009.exe 4512 202401310009.exe 4512 202401310009.exe 3728 202401310009.exe 3728 202401310009.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4512 202401310009.exe Token: SeDebugPrivilege 2552 powershell.exe Token: SeDebugPrivilege 3728 202401310009.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 4512 wrote to memory of 2488 4512 202401310009.exe 86 PID 4512 wrote to memory of 2488 4512 202401310009.exe 86 PID 4512 wrote to memory of 2488 4512 202401310009.exe 86 PID 2488 wrote to memory of 444 2488 cmd.exe 88 PID 2488 wrote to memory of 444 2488 cmd.exe 88 PID 2488 wrote to memory of 444 2488 cmd.exe 88 PID 4512 wrote to memory of 2552 4512 202401310009.exe 89 PID 4512 wrote to memory of 2552 4512 202401310009.exe 89 PID 4512 wrote to memory of 2552 4512 202401310009.exe 89 PID 4512 wrote to memory of 4200 4512 202401310009.exe 97 PID 4512 wrote to memory of 4200 4512 202401310009.exe 97 PID 4512 wrote to memory of 4200 4512 202401310009.exe 97 PID 4200 wrote to memory of 5116 4200 cmd.exe 98 PID 4200 wrote to memory of 5116 4200 cmd.exe 98 PID 4200 wrote to memory of 5116 4200 cmd.exe 98 PID 4512 wrote to memory of 4664 4512 202401310009.exe 99 PID 4512 wrote to memory of 4664 4512 202401310009.exe 99 PID 4512 wrote to memory of 4664 4512 202401310009.exe 99 PID 4512 wrote to memory of 4008 4512 202401310009.exe 100 PID 4512 wrote to memory of 4008 4512 202401310009.exe 100 PID 4512 wrote to memory of 4008 4512 202401310009.exe 100 PID 4512 wrote to memory of 3808 4512 202401310009.exe 101 PID 4512 wrote to memory of 3808 4512 202401310009.exe 101 PID 4512 wrote to memory of 3808 4512 202401310009.exe 101 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102 PID 4512 wrote to memory of 3728 4512 202401310009.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\202401310009.exe"C:\Users\Admin\AppData\Local\Temp\202401310009.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:444
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwAXABUAGUAbQBwAFwAMgAwADIANAAwADEAMwAxADAAMAAwADkALgBlAHgAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgADIAMAAyADQAMAAxADMAMQAwADAAMAA5AC4AZQB4AGUAOwA=2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2552
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:5116
-
-
-
C:\Users\Admin\AppData\Local\Temp\202401310009.exeC:\Users\Admin\AppData\Local\Temp\202401310009.exe2⤵PID:4664
-
-
C:\Users\Admin\AppData\Local\Temp\202401310009.exeC:\Users\Admin\AppData\Local\Temp\202401310009.exe2⤵PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\202401310009.exeC:\Users\Admin\AppData\Local\Temp\202401310009.exe2⤵PID:3808
-
-
C:\Users\Admin\AppData\Local\Temp\202401310009.exeC:\Users\Admin\AppData\Local\Temp\202401310009.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3728
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c3941d9fa38f1717d5cecd7a2ca71667
SHA133b5362675383b58b4166ed9f9a61e5aa6768d2e
SHA256f1ed6ff1cd3df219061e32df1c75d6f48de6484cf50e5ea7d86cd8bcfcb93256
SHA51298f103ef97d32bf8c0566a6f6da5cf8d58d18f698c1b3e5bd0be0ea8462f5fe54c2e5e6b5188f2b7d8f70082ffd6745b1f7f6cab95af474e2b7eaed50a9d9c45
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82