Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    102s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/03/2024, 17:01

General

  • Target

    dddd/Générateur Scorpion-Premium.exe

  • Size

    1.1MB

  • MD5

    c7936aa7c0ed1759dbaa45ed4e13a548

  • SHA1

    1b7cec2a815a93e7d0f5d6480d9dbdd30953245f

  • SHA256

    0f760af630a93cd72a6580ffbebaf7eea6912255435b48f4e7dc4a696c0d3662

  • SHA512

    88b0d35114f3a6ed167774062f6d7d89125d61a3132b72d41c8293eef940a05ac8d487ebb5659d6b4ff6616967c3e27d5e9698c84680e948fff7d1df0915b930

  • SSDEEP

    12288:oo+H5nseophtd5FJgeF9CMIXSvIlclxXSvIlclHXSvIlcl:odMhlFnC5cl5clbcl

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dddd\Générateur Scorpion-Premium.exe
    "C:\Users\Admin\AppData\Local\Temp\dddd\Générateur Scorpion-Premium.exe"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    PID:4156

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4156-0-0x0000000074D30000-0x00000000754E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4156-1-0x0000000000450000-0x000000000056A000-memory.dmp

    Filesize

    1.1MB

  • memory/4156-2-0x0000000005560000-0x0000000005B04000-memory.dmp

    Filesize

    5.6MB

  • memory/4156-3-0x0000000004FB0000-0x0000000005042000-memory.dmp

    Filesize

    584KB

  • memory/4156-4-0x0000000005370000-0x0000000005382000-memory.dmp

    Filesize

    72KB

  • memory/4156-5-0x0000000005400000-0x0000000005410000-memory.dmp

    Filesize

    64KB

  • memory/4156-6-0x0000000005500000-0x000000000550A000-memory.dmp

    Filesize

    40KB

  • memory/4156-7-0x0000000005F10000-0x0000000006106000-memory.dmp

    Filesize

    2.0MB

  • memory/4156-8-0x0000000005B30000-0x0000000005B4C000-memory.dmp

    Filesize

    112KB

  • memory/4156-9-0x0000000005400000-0x0000000005410000-memory.dmp

    Filesize

    64KB

  • memory/4156-10-0x0000000008B40000-0x0000000008B7C000-memory.dmp

    Filesize

    240KB

  • memory/4156-11-0x0000000074D30000-0x00000000754E0000-memory.dmp

    Filesize

    7.7MB

  • memory/4156-12-0x0000000005400000-0x0000000005410000-memory.dmp

    Filesize

    64KB

  • memory/4156-13-0x0000000005400000-0x0000000005410000-memory.dmp

    Filesize

    64KB