Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 13:07
Static task
static1
Behavioral task
behavioral1
Sample
PO JSC_109117.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO JSC_109117.exe
Resource
win10v2004-20240412-en
General
-
Target
PO JSC_109117.exe
-
Size
113KB
-
MD5
2222a02624129789dd29c05a6478ba5b
-
SHA1
9518b4926893cf093bb012d691ec6ea0f4f66785
-
SHA256
a35a4d58e12b7c68d26502cee706e06a7e2145eaf3bcf3a1c1ea2668c4da8dc4
-
SHA512
0385ae956f75896a5e76241ef470d582b757bb8197e487c6bc6acd5a525abeb47be68bfd217d439223a937015f5229ae0af3950c891744c68c6c65f66483ef22
-
SSDEEP
384:4rYOf8QD8PJoDpsPNupo0C/K4vL3/ca3PphQUZUx7V9G9rv6vF4bWQ5lDRolLL4f:4cU8QD8vPNuSJhvL3V/bQH7aFWEO
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot6455833672:AAEFwznYRFbwog3UBqp13FPbH7YVb236SRI/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 31 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4504 set thread context of 1664 4504 PO JSC_109117.exe 96 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3140 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 980 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4504 PO JSC_109117.exe 4504 PO JSC_109117.exe 1664 AppLaunch.exe 1664 AppLaunch.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4504 PO JSC_109117.exe Token: SeDebugPrivilege 1664 AppLaunch.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4504 wrote to memory of 3512 4504 PO JSC_109117.exe 84 PID 4504 wrote to memory of 3512 4504 PO JSC_109117.exe 84 PID 3512 wrote to memory of 4196 3512 cmd.exe 86 PID 3512 wrote to memory of 4196 3512 cmd.exe 86 PID 4504 wrote to memory of 3480 4504 PO JSC_109117.exe 87 PID 4504 wrote to memory of 3480 4504 PO JSC_109117.exe 87 PID 3480 wrote to memory of 3140 3480 cmd.exe 89 PID 3480 wrote to memory of 3140 3480 cmd.exe 89 PID 4504 wrote to memory of 5044 4504 PO JSC_109117.exe 95 PID 4504 wrote to memory of 5044 4504 PO JSC_109117.exe 95 PID 4504 wrote to memory of 5044 4504 PO JSC_109117.exe 95 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 1664 4504 PO JSC_109117.exe 96 PID 4504 wrote to memory of 3004 4504 PO JSC_109117.exe 97 PID 4504 wrote to memory of 3004 4504 PO JSC_109117.exe 97 PID 3004 wrote to memory of 980 3004 cmd.exe 99 PID 3004 wrote to memory of 980 3004 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO JSC_109117.exe"C:\Users\Admin\AppData\Local\Temp\PO JSC_109117.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C schtasks /Query /TN "Exply Interface Helpers"2⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\system32\schtasks.exeschtasks /Query /TN "Exply Interface Helpers"3⤵PID:4196
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /C schtasks /Create /SC HOURLY /MO 1 /TN "Exply Interface Helpers" /TR "\"C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\PO JSC_109117.exe\" \"ContainImplementation\"" /F2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\system32\schtasks.exeschtasks /Create /SC HOURLY /MO 1 /TN "Exply Interface Helpers" /TR "\"C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\PO JSC_109117.exe\" \"ContainImplementation\"" /F3⤵
- Creates scheduled task(s)
PID:3140
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵PID:5044
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DelegateInterface.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\system32\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD5034dbacbf21c73caf5b87a6d8e38ad3e
SHA1500af40c134e39a5ecaf343dde74ef7c0fef5465
SHA2563f26df189ac7974c5d6559d539d9fbfe22edc974c665740a3e4bf9cddcad8aa9
SHA5127917b33fdaa8de336dbd360538ddaad13ab8ba74e8d17c6647ebb70747ac5be1978f446c6cb223b9378b8f6ec1966edfe6c9638c54ecafaac6a995174d2ecd38