Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20240226-en
General
-
Target
SOA.exe
-
Size
705KB
-
MD5
eec9920c7f8ec7c4c1b869c0c58e9475
-
SHA1
1ef6bd5093d3e3f4b742d0ff30cfa5c0f4b7dc2a
-
SHA256
73e0732124b786a80d0cf5723d7946267338cb2cd92a547dd7f2bb1d77d1d366
-
SHA512
0dc2ed9814b9b5f47fa144d415398b0a3bf6ad603e75b175adf6dc86ff5ca94d3d48fe33594dbc248765e6ae0e101f2b4549784038d37b168fed58a122c6e227
-
SSDEEP
12288:/4oL9bW9ez7dWceoN6xcHFpsDavL6ZsN593GwNHVl/Zd4xurX1lyz2kR:/tL9iy5XSaQDavL6mN593TN1f/3Qt
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.clslk.com - Port:
587 - Username:
[email protected] - Password:
NUZRATHinam1978 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2756 set thread context of 2568 2756 SOA.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2636 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2756 SOA.exe 2756 SOA.exe 2756 SOA.exe 2536 powershell.exe 2672 powershell.exe 2756 SOA.exe 2568 RegSvcs.exe 2568 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2756 SOA.exe Token: SeDebugPrivilege 2536 powershell.exe Token: SeDebugPrivilege 2672 powershell.exe Token: SeDebugPrivilege 2568 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2536 2756 SOA.exe 28 PID 2756 wrote to memory of 2536 2756 SOA.exe 28 PID 2756 wrote to memory of 2536 2756 SOA.exe 28 PID 2756 wrote to memory of 2536 2756 SOA.exe 28 PID 2756 wrote to memory of 2672 2756 SOA.exe 30 PID 2756 wrote to memory of 2672 2756 SOA.exe 30 PID 2756 wrote to memory of 2672 2756 SOA.exe 30 PID 2756 wrote to memory of 2672 2756 SOA.exe 30 PID 2756 wrote to memory of 2636 2756 SOA.exe 31 PID 2756 wrote to memory of 2636 2756 SOA.exe 31 PID 2756 wrote to memory of 2636 2756 SOA.exe 31 PID 2756 wrote to memory of 2636 2756 SOA.exe 31 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34 PID 2756 wrote to memory of 2568 2756 SOA.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOA.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wmlXpVhesQLQOC.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2672
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wmlXpVhesQLQOC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5EA4.tmp"2⤵
- Creates scheduled task(s)
PID:2636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD551569c9bf1d2071fdcb9650976f92252
SHA114b417f1ea7829d66a62616e188229b1004c3045
SHA256d328d51ba465ab2a3eebcc0cfccaeb5e7e267c193276f5af839583f50fa3fa76
SHA51209766f86faeff2989c526fa1e6ffce4f979dcdf7e65bf06cd4d1d6f50c3ccaf4ebef5022cdef08bec1a7ff7c0c76da654c1d0723c5120435808485d6e753967c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PZYM5CMVW86HGDOR363A.temp
Filesize7KB
MD52615524476b4b4ed57fa85c7254255d8
SHA1eee0c80164213bd7d6c13efc2c54bf7e0a8def56
SHA256789b11ac5e5d8eefecf8f026559bd8ad4c212d466846469dccd3d1e874543372
SHA512347f94c007f881b62b2c863cbfd233e1ae9d718de5ad3bb6d80a63daf31999a65f776673486d3d3d6828a27699f354e67a640c687a3118833433d287dd3ca0e3