Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    195s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 13:49 UTC

General

  • Target

    ce021aaca1ac091165c6bd6d9b27d41c0994d308f39bce54a5d7e59ba76a421e.exe

  • Size

    611KB

  • MD5

    bb890594548df51e5957ca2445cd7fb8

  • SHA1

    7aabf17acfff6e33ef68bbccea7b266a48205fff

  • SHA256

    ce021aaca1ac091165c6bd6d9b27d41c0994d308f39bce54a5d7e59ba76a421e

  • SHA512

    feaa88044792da5886b7fb4cf7eb4d67ca7be07b2376ae0e5d980be69c873f52db45eef9ab1e4b97f6dc9c1d99350fbbc579462bad7cb5bed49cbdb9752cd022

  • SSDEEP

    12288:4SMpPbU8sOUVVhUF+i1c/OGNX+jkniNzXNDu8Z2RjbY8rk45az:4/pPbrUVo+sGNXPiN8W25YqtE

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    cp8nl.hyperhost.ua
  • Port:
    587
  • Username:
    royallog@fibraunollc.top
  • Password:
    7213575aceACE@#$
  • Email To:
    royal@fibraunollc.top

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce021aaca1ac091165c6bd6d9b27d41c0994d308f39bce54a5d7e59ba76a421e.exe
    "C:\Users\Admin\AppData\Local\Temp\ce021aaca1ac091165c6bd6d9b27d41c0994d308f39bce54a5d7e59ba76a421e.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2820
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1240
      • C:\Windows\system32\schtasks.exe
        schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'
        3⤵
        • Creates scheduled task(s)
        PID:2848
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE956.tmp.bat""
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2684
      • C:\Windows\system32\timeout.exe
        timeout 3
        3⤵
        • Delays execution with timeout.exe
        PID:1200
      • C:\Users\Admin\AppData\Roaming\svchost.exe
        "C:\Users\Admin\AppData\Roaming\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1876
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
          4⤵
            PID:2028
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2540
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
              PID:2340

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmpE956.tmp.bat

        Filesize

        151B

        MD5

        850913584f26d4cab5637dcf50581eec

        SHA1

        fd9193183620d186ba336877dddf8f3ab2bdf0d2

        SHA256

        382416b357aab3c389edf502158254e7459135a015160773da8000ce74c1186b

        SHA512

        d506a61f97fa6426bbcfea9f88e89971af90bcfe9eba19d43b7ea8f077578e27f24fb0c982847c0d7a9e696ef0cbe3c3b4a60857e2a00d9fb66ae2a2789f03f3

      • \Users\Admin\AppData\Roaming\svchost.exe

        Filesize

        611KB

        MD5

        bb890594548df51e5957ca2445cd7fb8

        SHA1

        7aabf17acfff6e33ef68bbccea7b266a48205fff

        SHA256

        ce021aaca1ac091165c6bd6d9b27d41c0994d308f39bce54a5d7e59ba76a421e

        SHA512

        feaa88044792da5886b7fb4cf7eb4d67ca7be07b2376ae0e5d980be69c873f52db45eef9ab1e4b97f6dc9c1d99350fbbc579462bad7cb5bed49cbdb9752cd022

      • memory/1876-30-0x00000000004D0000-0x0000000000550000-memory.dmp

        Filesize

        512KB

      • memory/1876-41-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1876-21-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1876-20-0x00000000004D0000-0x0000000000550000-memory.dmp

        Filesize

        512KB

      • memory/1876-19-0x000007FEF5440000-0x000007FEF5E2C000-memory.dmp

        Filesize

        9.9MB

      • memory/1876-18-0x00000000012E0000-0x00000000012EC000-memory.dmp

        Filesize

        48KB

      • memory/2028-26-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2028-22-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2028-24-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2028-28-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2540-43-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2540-47-0x00000000749D0000-0x00000000750BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2540-46-0x00000000749D0000-0x00000000750BE000-memory.dmp

        Filesize

        6.9MB

      • memory/2540-39-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2540-45-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2540-40-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2820-3-0x0000000001EF0000-0x0000000001F86000-memory.dmp

        Filesize

        600KB

      • memory/2820-0-0x0000000000AE0000-0x0000000000AEC000-memory.dmp

        Filesize

        48KB

      • memory/2820-1-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

        Filesize

        9.9MB

      • memory/2820-13-0x000007FEF5E30000-0x000007FEF681C000-memory.dmp

        Filesize

        9.9MB

      • memory/2820-2-0x000000001B300000-0x000000001B380000-memory.dmp

        Filesize

        512KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.