Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
116s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/04/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
MBLHBL SHIPPING ADVICE.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
MBLHBL SHIPPING ADVICE.exe
Resource
win10v2004-20240226-en
General
-
Target
MBLHBL SHIPPING ADVICE.exe
-
Size
774KB
-
MD5
9dbcfb571d0de80c22db7eb590eb540b
-
SHA1
da26a3ec36ea3121082278260995b675fa5fb07e
-
SHA256
4e8077f0dbb336a020e8491806b49acc65f8a3e2b0c2e0481a6de1a41d8fbeee
-
SHA512
8b2413a809698fe1d4acbe3b7d2ec3447c73b7f2adb733fbe98d92f5444342f334da5753373b1f602e8c3de3128baccba4f7907b18b310351a488b326d9a6000
-
SSDEEP
24576:GjFoOBrBlmltzyJeecsYzyXSR/uEUwtI8Gg:Ge0BlMt0RFSR/uNKI8R
Malware Config
Extracted
Protocol: smtp- Host:
mail.rhinetrading.com - Port:
587 - Username:
[email protected] - Password:
Am!r020Rhin3
Extracted
agenttesla
Protocol: smtp- Host:
mail.rhinetrading.com - Port:
587 - Username:
[email protected] - Password:
Am!r020Rhin3 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation MBLHBL SHIPPING ADVICE.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2444 set thread context of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4956 powershell.exe 4208 powershell.exe 3740 MBLHBL SHIPPING ADVICE.exe 3740 MBLHBL SHIPPING ADVICE.exe 4956 powershell.exe 4208 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4208 powershell.exe Token: SeDebugPrivilege 4956 powershell.exe Token: SeDebugPrivilege 3740 MBLHBL SHIPPING ADVICE.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2444 wrote to memory of 4208 2444 MBLHBL SHIPPING ADVICE.exe 91 PID 2444 wrote to memory of 4208 2444 MBLHBL SHIPPING ADVICE.exe 91 PID 2444 wrote to memory of 4208 2444 MBLHBL SHIPPING ADVICE.exe 91 PID 2444 wrote to memory of 4956 2444 MBLHBL SHIPPING ADVICE.exe 93 PID 2444 wrote to memory of 4956 2444 MBLHBL SHIPPING ADVICE.exe 93 PID 2444 wrote to memory of 4956 2444 MBLHBL SHIPPING ADVICE.exe 93 PID 2444 wrote to memory of 4824 2444 MBLHBL SHIPPING ADVICE.exe 95 PID 2444 wrote to memory of 4824 2444 MBLHBL SHIPPING ADVICE.exe 95 PID 2444 wrote to memory of 4824 2444 MBLHBL SHIPPING ADVICE.exe 95 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97 PID 2444 wrote to memory of 3740 2444 MBLHBL SHIPPING ADVICE.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\MBLHBL SHIPPING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\MBLHBL SHIPPING ADVICE.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\MBLHBL SHIPPING ADVICE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\drNPesqY.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\drNPesqY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5FD3.tmp"2⤵
- Creates scheduled task(s)
PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\MBLHBL SHIPPING ADVICE.exe"C:\Users\Admin\AppData\Local\Temp\MBLHBL SHIPPING ADVICE.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58ec831f3e3a3f77e4a7b9cd32b48384c
SHA1d83f09fd87c5bd86e045873c231c14836e76a05c
SHA2567667e538030e3f8ce2886e47a01af24cb0ea70528b1e821c5d8832c5076cb982
SHA51226bffa2406b66368bd412bf25869a792631455645992cdcade2dbc13a2e56fb546414a6a9223b94c96c38d89187add6678d4779a88b38b0c9e36be8527b213c3
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD573c1b9d9ad05750373dc85e0553f7c99
SHA1c5e50f24d5466463cbe1542b8eea7a7e245b9f90
SHA256f5bf0f3e77cd695bab9bb331b68aed67d6d1cef5189e74d4467b021705f4abb1
SHA51289988ec357271b930aa5e19e1057a9a848281ff525fe94873765e1afea6a0f38632abf98d4a05049dc608dcd1c122985187aacc0d898cc50461d25dd95b25b97
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5269c051406dfc79c22519ac8f8959f06
SHA1cdf455787a8b5da4b9d34ca7eb144e1d7936fb7d
SHA25632f057bd3b533132b55582f98c987c1e74193e97427b649438b5f9b11952ff79
SHA512e70d3de69f748a90dc9905f0e4c20e6257dd02b7b88e337143c5649c455c08f0ee7440dbd12ccca26a457c568a0c0ede8758d72e4b560c08afe11221ab07ed8f