Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19/03/2024, 01:39
Static task
static1
Behavioral task
behavioral1
Sample
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe
Resource
win10v2004-20240226-en
General
-
Target
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe
-
Size
633KB
-
MD5
039dc550d934b9fcf052edb597c88615
-
SHA1
12b0e0f854d8e8f803c3a422c27210663e7af713
-
SHA256
50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854
-
SHA512
7f6d05b67bcd75c29a982f6bcb3c37877d037c94e9f56e59d8338de74d92355ce9c1e2fe8f7302e89c25d438eab94f717f017ab0bcae27156ac7c7c87ef86fe7
-
SSDEEP
12288:Y7kmn8KAc60WTPVB8W2Jj38iHC5Bk0OdeMe9P1J8pknAR3/cWagRhHkR:YQmnPQDVB8W2J38CCE0Se9P1GgARvcsu
Malware Config
Extracted
Protocol: smtp- Host:
mail.qool-point.co.ke - Port:
587 - Username:
[email protected] - Password:
Hamida2023??
Extracted
agenttesla
Protocol: smtp- Host:
mail.qool-point.co.ke - Port:
587 - Username:
[email protected] - Password:
Hamida2023?? - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2461186416-2307104501-1787948496-1000\Software\Microsoft\Windows\CurrentVersion\Run\zGdjG = "C:\\Users\\Admin\\AppData\\Roaming\\zGdjG\\zGdjG.exe" 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 api.ipify.org 3 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 952 set thread context of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2132 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 2408 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 2408 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 2616 powershell.exe 2568 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe Token: SeDebugPrivilege 2408 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe Token: SeDebugPrivilege 2616 powershell.exe Token: SeDebugPrivilege 2568 powershell.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 952 wrote to memory of 2616 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 28 PID 952 wrote to memory of 2616 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 28 PID 952 wrote to memory of 2616 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 28 PID 952 wrote to memory of 2616 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 28 PID 952 wrote to memory of 2568 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 30 PID 952 wrote to memory of 2568 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 30 PID 952 wrote to memory of 2568 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 30 PID 952 wrote to memory of 2568 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 30 PID 952 wrote to memory of 2132 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 32 PID 952 wrote to memory of 2132 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 32 PID 952 wrote to memory of 2132 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 32 PID 952 wrote to memory of 2132 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 32 PID 952 wrote to memory of 2524 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 34 PID 952 wrote to memory of 2524 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 34 PID 952 wrote to memory of 2524 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 34 PID 952 wrote to memory of 2524 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 34 PID 952 wrote to memory of 2464 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 35 PID 952 wrote to memory of 2464 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 35 PID 952 wrote to memory of 2464 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 35 PID 952 wrote to memory of 2464 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 35 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36 PID 952 wrote to memory of 2408 952 50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vZAfmDOZJkx.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vZAfmDOZJkx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp83C0.tmp"2⤵
- Creates scheduled task(s)
PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"2⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"2⤵PID:2464
-
-
C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"C:\Users\Admin\AppData\Local\Temp\50d062f2af11b77ece351cb40bb60ddf80894ccef2faf7dd031235e56873a854.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD5753df6889fd7410a2e9fe333da83a429
SHA13c425f16e8267186061dd48ac1c77c122962456e
SHA256b42dc237e44cbc9a43400e7d3f9cbd406dbdefd62bfe87328f8663897d69df78
SHA5129d56f79410ad0cf852c74c3ef9454e7ae86e80bdd6ff67773994b48ccac71142bcf5c90635da6a056e1406e81e64674db9584928e867c55b77b59e2851cf6444
-
Filesize
175KB
MD5dd73cead4b93366cf3465c8cd32e2796
SHA174546226dfe9ceb8184651e920d1dbfb432b314e
SHA256a6752b7851b591550e4625b832a393aabcc428de18d83e8593cd540f7d7cae22
SHA512ce1bdd595065c94fa528badf4a6a8777893807d6789267612755df818ba6ffe55e4df429710aea29526ee4aa8ef20e25f2f05341da53992157d21ae032c0fb63
-
Filesize
1KB
MD51732ff79f9043b3a6d556fd9463f7a46
SHA198d647779e7e1cfe956af90b909a839ca3a5253b
SHA256117e82fc059c095a0824989e5e8b49728198f02132fa4f23d4dc85df194e0482
SHA51277186288c99eb870c78c5f26f9cf93c1cf0dc93b88612752a14e9e28d8a611710ae13b546237a1acd5893df02ea7e08683bb4ca8a3da623450aa85f2478ede2c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD534a5fc9d73745f4f6dd18d31420a3e9f
SHA1c9c0362e10d44dab78002e2b3696e26f25e531cf
SHA256e5ac520a9117c7be64ba38310cce524fcb3cbd22d2b1b880783a88fb789ce4d1
SHA512ab5875c4a2f74e3f4801f1f9776764ce9c3091ccfff64f989ae15548726a9e952aac0fc19c1d784a3b82055715e50dc48dcb913631138050f02943289c67f529