Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 15:13
Static task
static1
Behavioral task
behavioral1
Sample
e-dekont_html.scr.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e-dekont_html.scr.exe
Resource
win10v2004-20240412-en
General
-
Target
e-dekont_html.scr.exe
-
Size
1.0MB
-
MD5
abc774f48c2e514bde4ba275a4314b4a
-
SHA1
141d5d859afb0340302bd4ee2ca2be9493f39804
-
SHA256
fad3e7058eb2fa88ce97e62a6a243748d6736f9c4e21e4112ed61a40813588b2
-
SHA512
3d2158afab276197313827e33bf25302b623fbf69a48892fcceb69c50690bf6bf9e7047ab18870030259bdb34d9b3fa7a32552a6964698f354e03ae531978065
-
SSDEEP
24576:kp7jSc9duaYoRV9ii5nHMAXJ2LiMOxckwle5O4i:sGc9VTntVXJKiu
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
cp8nl.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2224 set thread context of 2488 2224 e-dekont_html.scr.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2604 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2224 e-dekont_html.scr.exe 2224 e-dekont_html.scr.exe 2224 e-dekont_html.scr.exe 2224 e-dekont_html.scr.exe 2224 e-dekont_html.scr.exe 2488 e-dekont_html.scr.exe 2488 e-dekont_html.scr.exe 2792 powershell.exe 2572 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2224 e-dekont_html.scr.exe Token: SeDebugPrivilege 2488 e-dekont_html.scr.exe Token: SeDebugPrivilege 2572 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2572 2224 e-dekont_html.scr.exe 28 PID 2224 wrote to memory of 2572 2224 e-dekont_html.scr.exe 28 PID 2224 wrote to memory of 2572 2224 e-dekont_html.scr.exe 28 PID 2224 wrote to memory of 2572 2224 e-dekont_html.scr.exe 28 PID 2224 wrote to memory of 2792 2224 e-dekont_html.scr.exe 30 PID 2224 wrote to memory of 2792 2224 e-dekont_html.scr.exe 30 PID 2224 wrote to memory of 2792 2224 e-dekont_html.scr.exe 30 PID 2224 wrote to memory of 2792 2224 e-dekont_html.scr.exe 30 PID 2224 wrote to memory of 2604 2224 e-dekont_html.scr.exe 32 PID 2224 wrote to memory of 2604 2224 e-dekont_html.scr.exe 32 PID 2224 wrote to memory of 2604 2224 e-dekont_html.scr.exe 32 PID 2224 wrote to memory of 2604 2224 e-dekont_html.scr.exe 32 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36 PID 2224 wrote to memory of 2488 2224 e-dekont_html.scr.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\e-dekont_html.scr.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont_html.scr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\e-dekont_html.scr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZRbgEuSJYOgOl.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZRbgEuSJYOgOl" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE15A.tmp"2⤵
- Creates scheduled task(s)
PID:2604
-
-
C:\Users\Admin\AppData\Local\Temp\e-dekont_html.scr.exe"C:\Users\Admin\AppData\Local\Temp\e-dekont_html.scr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD556b446afbbc076f24b03212517a80a8b
SHA117556ea75c9f18565161a615ebd035d5a1564d39
SHA2563305215abec2152c8fbfe8bc3d5fb8a4f9a591cce6a069b073951b7e58f4bcb7
SHA51284e4f5953d235387775770b6a20561f08eb45ef4848e4e9811168220e440b1e6f4aac4b3b9397ba955ca31af0d5696218eb591822c067b26562f0a48b997ab59
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD598e178e7bf1f6b404c85c4c225f0aadb
SHA118abe64825780a5e2b665a3fafdd2adf8269376c
SHA25661b6391b54898766172c8f1781ec9d750cc6eec564d94e9442297464201ed6c7
SHA5126860a85d95e31dea8108d72f7961d2ba58c2b095371795a159c3b53f89c1aaf47b3167bef0f09256e73df9e408d0157c92b373a4edb024e972fbc9c9b3194922