Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    121s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    24/02/2024, 08:31

General

  • Target

    QUOTATION REQUIRD.exe

  • Size

    39KB

  • MD5

    a08fc570175654538ef118d911b16436

  • SHA1

    2712e7784d75d4746032e825eca8abc0a8306245

  • SHA256

    013cfd5a41b2ad509d642e132c4eee49ed5a19418b7ff77523a9965a08afa008

  • SHA512

    5b0aced9b7a7a1c82195b178a55351ba51ced19052e7fa1f837055e5c2b763d8ab00ff420206a65541cd6b9568d8baa954fe457b019402edf5921e6e3b39848d

  • SSDEEP

    768:iRXnmQnpZJE8sNd9LnZVxSy9eg1W6T+v5q:QhnpZJEj39DNSy9rdCvU

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Contacts a large (4670) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Detect packed .NET executables. Mostly AgentTeslaV4. 6 IoCs
  • Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers. 6 IoCs
  • Detects binaries and memory artifacts referencing sandbox DLLs typically observed in sandbox evasion 6 IoCs
  • Detects executables packed with or use KoiVM 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 6 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 6 IoCs
  • Detects executables referencing many email and collaboration clients. Observed in information stealers 6 IoCs
  • Detects executables referencing many file transfer clients. Observed in information stealers 6 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUIRD.exe
    "C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUIRD.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    33955e2fcc15d0d243a625183f738d38

    SHA1

    c37ee9ccc7f4ac0231cffe820433411210ca8889

    SHA256

    4e56dda9507f9de8b2a3354a62e9d4f454ba652be6a3a1302dafce78ed161db2

    SHA512

    51e282dae85c3ca384b53e03755390c14a69d42f8c6f6814ea6d82f2cfa73775d0e1de2bcdd3e2393263f57e387dc537394e26b49bc7ac9e05017aa89ca7c009

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    917cdf0563d4b01e5d8780ca89ffb156

    SHA1

    acb85dc221f8c71ec7cb1d2e4e78eff38f6ca057

    SHA256

    0b012d7764afff763d587186e3c8daabccadfeb2897b08aaa6bebcc7d363c425

    SHA512

    538e32be1e16c7ed47cd6da1380c051e7f8af75a7ce425ba277d07901759fb537253ccd7d8d50b3162110f51a7f7e65ee5b43fff9457892379a604f5817b8116

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c96f07278c338da071d44d7993e2beb3

    SHA1

    9aca09314bdf3dbaa91d0f7eac262e2ac76203f6

    SHA256

    53bdfe5617004580d8c6df9b133c98063580323c100bcb02e7d931938962b803

    SHA512

    7da85644f579f21d8dbc4456ea9c31ac344be8b3f8574bb217e7157ce34f79122bddfa71d60ff512c2259e405487fe3761a2a192dea11325eebdfae15926ebff

  • C:\Users\Admin\AppData\Local\Temp\Cab604B.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar6D0A.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • memory/1032-222-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1032-235-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1032-240-0x00000000041F0000-0x0000000004230000-memory.dmp

    Filesize

    256KB

  • memory/1032-239-0x0000000074130000-0x000000007481E000-memory.dmp

    Filesize

    6.9MB

  • memory/1032-238-0x00000000041F0000-0x0000000004230000-memory.dmp

    Filesize

    256KB

  • memory/1032-237-0x0000000074130000-0x000000007481E000-memory.dmp

    Filesize

    6.9MB

  • memory/1032-224-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1032-233-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1032-226-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1032-228-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1032-230-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1032-231-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/3028-0-0x00000000003D0000-0x00000000003DE000-memory.dmp

    Filesize

    56KB

  • memory/3028-2-0x000000001B140000-0x000000001B1C0000-memory.dmp

    Filesize

    512KB

  • memory/3028-236-0x000007FEF5590000-0x000007FEF5F7C000-memory.dmp

    Filesize

    9.9MB

  • memory/3028-221-0x000000001C200000-0x000000001C294000-memory.dmp

    Filesize

    592KB

  • memory/3028-220-0x000000001B140000-0x000000001B1C0000-memory.dmp

    Filesize

    512KB

  • memory/3028-219-0x000007FEF5590000-0x000007FEF5F7C000-memory.dmp

    Filesize

    9.9MB

  • memory/3028-1-0x000007FEF5590000-0x000007FEF5F7C000-memory.dmp

    Filesize

    9.9MB