Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    118s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19/03/2024, 09:33

General

  • Target

    SecuriteInfo.com.Exploit.ShellCode.69.7870.25770.rtf

  • Size

    74KB

  • MD5

    25375705df41c56c40e056545ff3f4d9

  • SHA1

    8a2c0cd6307e0b60ac92bcce9ec9de0bf91e98fd

  • SHA256

    e2838cb88878911f84442041b0f01807d2fa0468a8f521ddf53dc1d578685126

  • SHA512

    23560663a0ec525a915bcbbd0544e549655de84fce4fca1272ea57dfe904d2a8a9befb35b3e750b232664f5aa2dee7dfb349268a4440f476c0495d8a7e0f7be7

  • SSDEEP

    1536:vLROkjy10yG0+Wm0x7mcLiqkep24scugrcfb0ogyi21mOlJWAL5WO4U6Rhq95kVF:vVtm0s+Wm0xNLiqkes4sXgrK09q1mOlc

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.ShellCode.69.7870.25770.rtf"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2300
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2912
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Roaming\lee.exe
        "C:\Users\Admin\AppData\Roaming\lee.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\lee.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1288
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HGvzWiTHEFaX.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2320
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HGvzWiTHEFaX" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB461.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:1036
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpB461.tmp

      Filesize

      1KB

      MD5

      4e10f8060a267a185bf0de149f35f6d1

      SHA1

      8dab300f9d65adedc158dae9f79f6bd9567927db

      SHA256

      057e4b65018ccec4c320aad2faf26d708a287a1702f10be620f2d6c29d8b68bf

      SHA512

      545a7bf38f25b29bce7bbd284db7b7999350d11523f448c23a9e59e7027fc502c199a2aba2372d380bc6f9bd630eec80397382039fcdfc268c9cabff535bf64b

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      fc6a985e01d01b1df3fde070f5d9f54f

      SHA1

      210ef37f25f9d52e65f3324a132fb3335c844213

      SHA256

      949f8244254c759a38a4df4bf5007adb4ffec36072f57852aebd0183305da791

      SHA512

      34e8fe5f3cf6d0391ca9eb2cc19818f4c57b6258cb56b01f5dd848a53670f9124a0043780bfa00a2b4479662125e9ed6cf58348f2d8f75110372c25aebca8e4f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      bdd44d0516935c850513d4abb696015f

      SHA1

      110ffe6ea8de30353326d4246f32c25e28bd5449

      SHA256

      d1e113d43d0b622cbae503bb029345448b72c27ca3f4bd037b9da5e1d8ece3cb

      SHA512

      bfbb1b45f31097af47f8688a0cef2cc2a87560c4980d81427c6a3d929e69f383f0d1c59737f0a2a77b80f4ddfcd7d7c1e99dbf8e9bd471a350cff3ed772f80cf

    • C:\Users\Admin\AppData\Roaming\lee.exe

      Filesize

      648KB

      MD5

      d5fda8517a450948764da4b1618f831e

      SHA1

      fe469fa291b9650d44eb331857ba206fb26f18b5

      SHA256

      f80634354eaa11b9bd3c8cc13f1dbd03b4b3b73de43bc6101ce99b05ffab4660

      SHA512

      323a184e5a1f44df66b5acfb833688ab1caf877a8c565acd517b01400a5032530d7026fed2d45448b887e5ea031d20628c44e459557a776861e3142448306f1f

    • memory/1252-49-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1252-69-0x0000000004560000-0x00000000045A0000-memory.dmp

      Filesize

      256KB

    • memory/1252-68-0x000000006B5B0000-0x000000006BC9E000-memory.dmp

      Filesize

      6.9MB

    • memory/1252-67-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1252-64-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1252-61-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1252-47-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1252-57-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1252-72-0x000000006B5B0000-0x000000006BC9E000-memory.dmp

      Filesize

      6.9MB

    • memory/1252-73-0x0000000004560000-0x00000000045A0000-memory.dmp

      Filesize

      256KB

    • memory/1252-53-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1252-45-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1288-54-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/1288-70-0x0000000065900000-0x0000000065EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1288-50-0x0000000065900000-0x0000000065EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1288-46-0x0000000065900000-0x0000000065EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/1288-62-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/1288-60-0x0000000000300000-0x0000000000340000-memory.dmp

      Filesize

      256KB

    • memory/2012-22-0x0000000005030000-0x0000000005070000-memory.dmp

      Filesize

      256KB

    • memory/2012-19-0x00000000000B0000-0x0000000000154000-memory.dmp

      Filesize

      656KB

    • memory/2012-31-0x0000000005070000-0x00000000050F2000-memory.dmp

      Filesize

      520KB

    • memory/2012-21-0x000000006B5B0000-0x000000006BC9E000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-27-0x0000000000440000-0x0000000000454000-memory.dmp

      Filesize

      80KB

    • memory/2012-30-0x0000000000580000-0x000000000058C000-memory.dmp

      Filesize

      48KB

    • memory/2012-66-0x000000006B5B0000-0x000000006BC9E000-memory.dmp

      Filesize

      6.9MB

    • memory/2012-29-0x0000000000470000-0x0000000000478000-memory.dmp

      Filesize

      32KB

    • memory/2300-0-0x000000002F321000-0x000000002F322000-memory.dmp

      Filesize

      4KB

    • memory/2300-91-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2300-5-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2300-92-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2300-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2300-2-0x000000007171D000-0x0000000071728000-memory.dmp

      Filesize

      44KB

    • memory/2320-56-0x0000000000530000-0x0000000000570000-memory.dmp

      Filesize

      256KB

    • memory/2320-71-0x0000000065900000-0x0000000065EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-44-0x0000000065900000-0x0000000065EAB000-memory.dmp

      Filesize

      5.7MB

    • memory/2320-58-0x0000000000530000-0x0000000000570000-memory.dmp

      Filesize

      256KB

    • memory/2320-48-0x0000000000530000-0x0000000000570000-memory.dmp

      Filesize

      256KB

    • memory/2320-52-0x0000000065900000-0x0000000065EAB000-memory.dmp

      Filesize

      5.7MB