Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    132s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04/04/2024, 21:10

General

  • Target

    c2ce115eece7c53ec5b202a0bd4d1778_JaffaCakes118.exe

  • Size

    800KB

  • MD5

    c2ce115eece7c53ec5b202a0bd4d1778

  • SHA1

    8cbb0836da268c35d2ad2691edaa4252134e21af

  • SHA256

    e3b438339a4ce2dba793223d9448b8c597080daaaf63bdd94a79079b78cf2fcf

  • SHA512

    a1c377449ce676685d30cc5f2cb3fb8c5d78d4c63986003ecc78fae5f2e8c8a77393c03c8bdd83a542a38ba204c297ffc2e9ca74f68424d2cedd71117a462e81

  • SSDEEP

    12288:c5vuhhyEdCes6MBL1zm2I4ku0aa8NQR+nENV9wsQu2RS8h4+nxFx/:choM16MBdx078KqiVSfBKGp

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.penavico--cz.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Fq$L%J((!6

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 6 IoCs
  • Nirsoft 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2ce115eece7c53ec5b202a0bd4d1778_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\c2ce115eece7c53ec5b202a0bd4d1778_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\sc.exe" /WindowState 0 /CommandLine "stop WinDefend" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2820
      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 2820
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2420
    • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
      "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /EXEFilename "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /WindowState 0 /CommandLine "rmdir 'C:\ProgramData\Microsoft\Windows Defender' -Recurse" /StartDirectory "" /RunAs 8 /Run
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2360
      • C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe
        "C:\Users\Admin\AppData\Local\Temp\AdvancedRun.exe" /SpecialRun 4101d8 2360
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2448
    • C:\Users\Admin\AppData\Local\Temp\c2ce115eece7c53ec5b202a0bd4d1778_JaffaCakes118.exe
      C:\Users\Admin\AppData\Local\Temp\c2ce115eece7c53ec5b202a0bd4d1778_JaffaCakes118.exe
      2⤵
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:640

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\AdvancedRun.exe

    Filesize

    88KB

    MD5

    17fc12902f4769af3a9271eb4e2dacce

    SHA1

    9a4a1581cc3971579574f837e110f3bd6d529dab

    SHA256

    29ae7b30ed8394c509c561f6117ea671ec412da50d435099756bbb257fafb10b

    SHA512

    036e0d62490c26dee27ef54e514302e1cc8a14de8ce3b9703bf7caf79cfae237e442c27a0edcf2c4fd41af4195ba9ed7e32e894767ce04467e79110e89522e4a

  • memory/640-30-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/640-33-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/640-38-0x0000000074650000-0x0000000074D3E000-memory.dmp

    Filesize

    6.9MB

  • memory/640-37-0x00000000008A0000-0x00000000008E0000-memory.dmp

    Filesize

    256KB

  • memory/640-36-0x0000000074650000-0x0000000074D3E000-memory.dmp

    Filesize

    6.9MB

  • memory/640-35-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/640-24-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/640-25-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/640-26-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/640-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/640-27-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/3060-1-0x00000000746D0000-0x0000000074DBE000-memory.dmp

    Filesize

    6.9MB

  • memory/3060-32-0x00000000746D0000-0x0000000074DBE000-memory.dmp

    Filesize

    6.9MB

  • memory/3060-2-0x00000000021B0000-0x0000000002252000-memory.dmp

    Filesize

    648KB

  • memory/3060-0-0x00000000002C0000-0x000000000038E000-memory.dmp

    Filesize

    824KB

  • memory/3060-5-0x00000000008B0000-0x00000000008D8000-memory.dmp

    Filesize

    160KB

  • memory/3060-4-0x0000000005070000-0x00000000050B0000-memory.dmp

    Filesize

    256KB

  • memory/3060-3-0x00000000746D0000-0x0000000074DBE000-memory.dmp

    Filesize

    6.9MB