Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    545s
  • max time network
    401s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 09:14

General

  • Target

    x (2).xls

  • Size

    323KB

  • MD5

    2be86255d5c58c9d1452c9cf39a6a66d

  • SHA1

    058d72f3e45476408ffaca4ce9f7b39a05ed3405

  • SHA256

    e6be399576b6bc96254e00a8743115604bf1dff765789d3483d3650575de6129

  • SHA512

    7d00f8f3f4d7d287b3731cf7c6631824255066b1aae4adaa641837e258f34be7aa50ea3b42b2b9d4822fb10a9ef3ee0507851c6dedb36ed2fc98cd975c5e9d41

  • SSDEEP

    6144:cuunJ1qZ+RwPONXoRjDhIcp0fDlavx+fgLt0d6oivSbVjHyNI89GQ8PYZMm/wOGP:cvJ1J3bVjyNI89f8P4wTUoIEn

Malware Config

Extracted

Family

agenttesla

Credentials

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Abuses OpenXML format to download file from external location
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\x (2).xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1724
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2588
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1480
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:1928
      • C:\Users\Admin\AppData\Roaming\HJC.exe
        "C:\Users\Admin\AppData\Roaming\HJC.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2676
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\HJC.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:588
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rvhClFSuTC.exe"
          3⤵
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1884
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rvhClFSuTC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5A40.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:1464
        • C:\Users\Admin\AppData\Roaming\HJC.exe
          "C:\Users\Admin\AppData\Roaming\HJC.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1768

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{00B728A4-8960-4CBF-83AE-14B6286E7C18}.FSD

      Filesize

      128KB

      MD5

      41b8c4369764d782e065d37619ff4019

      SHA1

      252ce7c94821cd1f8100d17bd9f5fe446354042f

      SHA256

      f974dcee023e95e5bf74a00dee4c8eff977b420bb27cdff236e2074e5fd8a8d3

      SHA512

      c8a2616be330d12bbd2e5eb3929a3a5d8e3b63feb32db8ff08e90d8eb3f2f41bc913162b59a7158a4c185dd32ab536653eb2b3c28875be6eb8a454e8fe339bb6

    • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{DCF0C963-9EF9-4D79-AE7B-9A4B3903E630}.FSD

      Filesize

      128KB

      MD5

      17c2015149279738888b9bdc66fae22e

      SHA1

      6a9a6b08fa94e3fcb5b388795447cf9693bcaa01

      SHA256

      0064d5d7cf00291601b500e76347d3bdab606d765f1481cd2c8fec494d49ffe4

      SHA512

      f094cb53f3ba1a4c9e030d3482810b37827d7a9fc4a93f0062384a04c9e867140cb298c56bf50a8a47153ab9384fd5e8a54aa994bd85b9cfe46556edd260f727

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\BO5VDUUS\iwillkissherwithentirethingstodowithouthavinghistalenttokissherwithlotofloveitrulylovedherwithoutinformation___ireallywantotlovehertrulysheismy[1].doc

      Filesize

      78KB

      MD5

      ed096dddbfcf9b78a74e3f65f30c0352

      SHA1

      4e736672d662dce4d9f5ee13324c41caa13b6743

      SHA256

      f73be5ad393981cda5dcc30559f1a3c034540ffe13d03d6016d1bf3ccf03feb5

      SHA512

      22c6828e0ce9f193b680e577da2b2a02219aef64ee9e86c39b25a29b61b0079fd68d31ecf7282d29f7bc909804e761dbbe9b53f9c903918c4e3a37ab756b494f

    • C:\Users\Admin\AppData\Local\Temp\tmp5A40.tmp

      Filesize

      1KB

      MD5

      18b24f24c65f85c42dae20fb479ca55d

      SHA1

      718fed3e74bebe3e4010aaf4aadeea7423365cda

      SHA256

      b0e5362387bdc4b719f0ccb0efa24654209efeb068f4e8c10fab340d508505c5

      SHA512

      90d99d8826ba10a3c61910de694c7f99946a7e72443ed6d3f92788898c3f3bc793647ac80f4f980b88479c337910f7ad4d405d11b4c13312ed7b4e3615123134

    • C:\Users\Admin\AppData\Local\Temp\{FC6A9982-6276-4AC9-9F2B-F30E6D2566F8}

      Filesize

      128KB

      MD5

      3ae580250968b57b36aae6df118d8b12

      SHA1

      ed122a49dccdf4fba3eec21cb502255bcd2a4aa5

      SHA256

      55d7deafd4a3180b13a647ab604ab4d0ca87b01dec816c1c61ec6f23b7fbec55

      SHA512

      1bf64e5bad8312a87a839b56e7cda9dda342daceb56c00d85a812f2fbeaae40e5729979910eba2978cf2f03a834d837d15957a858789f79770a0a989000f88b8

    • C:\Users\Admin\AppData\Roaming\HJC.exe

      Filesize

      652KB

      MD5

      d38790d5f832f007c8031e22d1b8d9f8

      SHA1

      c7aa58c8743e66dad54d1586ad39203b798d452a

      SHA256

      13a6b2f5611a02e6f7fda7652cc97d35c000fe045bf405f8e306fa67292dc5cf

      SHA512

      dc0c9b1cab4f13206e4c7b25c1776994c718e7dd0acb808e59e1149f8dd40ec2c5248803e2b6ae2db17c1f17c0d62ce56ecaae039651c275eb4cb0609bb3b968

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

      Filesize

      7KB

      MD5

      7c237004452d0f8167d8952cd78e028f

      SHA1

      371869254a4b0b235772f12d64f382067f0645f5

      SHA256

      a973b0687f9490cbf9f670392070b3ae60c0eb4104c177d935163acb9eaaaee5

      SHA512

      361b6440ce64d06813fe387b9cd8032b2f0ce14436e89e8d7e24e420b389c5ecd7bfb7f235c2143bd3889f94604de5c3feb50c4ee9255995b96cd8200fa56da4

    • memory/588-149-0x0000000065530000-0x0000000065ADB000-memory.dmp

      Filesize

      5.7MB

    • memory/588-120-0x0000000002590000-0x00000000025D0000-memory.dmp

      Filesize

      256KB

    • memory/588-119-0x0000000065530000-0x0000000065ADB000-memory.dmp

      Filesize

      5.7MB

    • memory/588-126-0x0000000002590000-0x00000000025D0000-memory.dmp

      Filesize

      256KB

    • memory/588-131-0x0000000065530000-0x0000000065ADB000-memory.dmp

      Filesize

      5.7MB

    • memory/1724-10-0x0000000002310000-0x0000000002312000-memory.dmp

      Filesize

      8KB

    • memory/1724-1-0x0000000071F7D000-0x0000000071F88000-memory.dmp

      Filesize

      44KB

    • memory/1724-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1724-103-0x0000000071F7D000-0x0000000071F88000-memory.dmp

      Filesize

      44KB

    • memory/1768-143-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1768-137-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1768-139-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1768-145-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1768-146-0x0000000069790000-0x0000000069E7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1768-130-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1768-147-0x0000000004A20000-0x0000000004A60000-memory.dmp

      Filesize

      256KB

    • memory/1768-135-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1768-164-0x0000000069790000-0x0000000069E7E000-memory.dmp

      Filesize

      6.9MB

    • memory/1768-165-0x0000000004A20000-0x0000000004A60000-memory.dmp

      Filesize

      256KB

    • memory/1768-124-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1768-127-0x0000000000400000-0x0000000000442000-memory.dmp

      Filesize

      264KB

    • memory/1884-122-0x0000000065530000-0x0000000065ADB000-memory.dmp

      Filesize

      5.7MB

    • memory/1884-148-0x0000000065530000-0x0000000065ADB000-memory.dmp

      Filesize

      5.7MB

    • memory/1884-133-0x0000000065530000-0x0000000065ADB000-memory.dmp

      Filesize

      5.7MB

    • memory/1884-123-0x0000000002790000-0x00000000027D0000-memory.dmp

      Filesize

      256KB

    • memory/1884-134-0x0000000002790000-0x00000000027D0000-memory.dmp

      Filesize

      256KB

    • memory/1884-121-0x0000000002790000-0x00000000027D0000-memory.dmp

      Filesize

      256KB

    • memory/2588-5-0x000000002FC91000-0x000000002FC92000-memory.dmp

      Filesize

      4KB

    • memory/2588-7-0x0000000071F7D000-0x0000000071F88000-memory.dmp

      Filesize

      44KB

    • memory/2588-9-0x00000000036D0000-0x00000000036D2000-memory.dmp

      Filesize

      8KB

    • memory/2588-128-0x0000000071F7D000-0x0000000071F88000-memory.dmp

      Filesize

      44KB

    • memory/2676-102-0x00000000008D0000-0x00000000008E8000-memory.dmp

      Filesize

      96KB

    • memory/2676-101-0x0000000000F50000-0x0000000000F90000-memory.dmp

      Filesize

      256KB

    • memory/2676-99-0x0000000069DF0000-0x000000006A4DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2676-98-0x0000000000FE0000-0x000000000108A000-memory.dmp

      Filesize

      680KB

    • memory/2676-142-0x0000000069DF0000-0x000000006A4DE000-memory.dmp

      Filesize

      6.9MB

    • memory/2676-104-0x0000000000940000-0x000000000094E000-memory.dmp

      Filesize

      56KB

    • memory/2676-105-0x0000000000950000-0x0000000000964000-memory.dmp

      Filesize

      80KB

    • memory/2676-106-0x0000000000B90000-0x0000000000C14000-memory.dmp

      Filesize

      528KB