Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/02/2024, 08:42
Behavioral task
behavioral1
Sample
742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe
Resource
win10v2004-20231215-en
General
-
Target
742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe
-
Size
235KB
-
MD5
311d5078eb3ae39116ae72c192e3c5a4
-
SHA1
91d2dcedecf54f5be245264255348809f2e5cc70
-
SHA256
742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f
-
SHA512
1ad45d63ec2821422f808260a826d1d084aaf84f2f11bd5ada94753c9539b777aaffe5b4a3bdc60e4737e546a84993291446c7085b9e128f1ed8ecd02325a51b
-
SSDEEP
3072:ZuCpfeWW++O/8obWxjtSh7ZiXYI2a55GeLMuUI:ZneWW++O/8o0jIhV62ahLM3
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.wasstech.com - Port:
587 - Username:
[email protected] - Password:
Sunray2700@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2620 742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe 2620 742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2620 742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe"C:\Users\Admin\AppData\Local\Temp\742b19fe7ebb06d9f0e36de5a2034836589f61feb0140eab7261dcdae9c0867f.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2620