Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/04/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
TNT Original Invoice.bat.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
TNT Original Invoice.bat.exe
Resource
win10v2004-20240426-en
General
-
Target
TNT Original Invoice.bat.exe
-
Size
667KB
-
MD5
c2853410ef7622a1c4011379555aeb6e
-
SHA1
69221ad76e4cd869ff6483ab44d1248bb0b0a9fa
-
SHA256
605ccfa010e2d945154cfb395a6a4855d00b710f447dbad889eb0415bb9710af
-
SHA512
bcaee778eb208cf5c97c8c32f6f3427b7991b241900dff060b1871cff04b0412d8ca9e7d56ff20cdfec17325881af6c72daa56d2eb06c9efd5caf580ccfe484c
-
SSDEEP
12288:BrueWFm+L0gJVGt0YKvh+PoiXPshhr/+2snkfh9r/tbfqo4uDUkas8b:kRFm+LX8Kv+o0mhrW2MkfDlfqBuB8
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5239412158:AAHXn8rC3uvBHy_kv77GtIcxcuvBuXcKD_8/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2868 set thread context of 2796 2868 TNT Original Invoice.bat.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2696 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2868 TNT Original Invoice.bat.exe 2868 TNT Original Invoice.bat.exe 2868 TNT Original Invoice.bat.exe 2868 TNT Original Invoice.bat.exe 2868 TNT Original Invoice.bat.exe 2868 TNT Original Invoice.bat.exe 2868 TNT Original Invoice.bat.exe 2796 TNT Original Invoice.bat.exe 2796 TNT Original Invoice.bat.exe 1720 powershell.exe 2876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2868 TNT Original Invoice.bat.exe Token: SeDebugPrivilege 2796 TNT Original Invoice.bat.exe Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 2876 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2796 TNT Original Invoice.bat.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2876 2868 TNT Original Invoice.bat.exe 28 PID 2868 wrote to memory of 2876 2868 TNT Original Invoice.bat.exe 28 PID 2868 wrote to memory of 2876 2868 TNT Original Invoice.bat.exe 28 PID 2868 wrote to memory of 2876 2868 TNT Original Invoice.bat.exe 28 PID 2868 wrote to memory of 1720 2868 TNT Original Invoice.bat.exe 30 PID 2868 wrote to memory of 1720 2868 TNT Original Invoice.bat.exe 30 PID 2868 wrote to memory of 1720 2868 TNT Original Invoice.bat.exe 30 PID 2868 wrote to memory of 1720 2868 TNT Original Invoice.bat.exe 30 PID 2868 wrote to memory of 2696 2868 TNT Original Invoice.bat.exe 31 PID 2868 wrote to memory of 2696 2868 TNT Original Invoice.bat.exe 31 PID 2868 wrote to memory of 2696 2868 TNT Original Invoice.bat.exe 31 PID 2868 wrote to memory of 2696 2868 TNT Original Invoice.bat.exe 31 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34 PID 2868 wrote to memory of 2796 2868 TNT Original Invoice.bat.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.bat.exe"C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.bat.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.bat.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YGFoajAV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YGFoajAV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp62E8.tmp"2⤵
- Creates scheduled task(s)
PID:2696
-
-
C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.bat.exe"C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.bat.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f416189d7455ec3024c675431b0b4ebe
SHA12364dced29059d69a2824f25414817b562dcc12b
SHA2562a5b20711ac9890fec001b35dd9a5df80b5f9ff8c093aa3a7e6e9da6d573cd9c
SHA5129f076f47b218329064899811d8b670d610669e1759190d0ba5342d7a87ccb28846cb74fbc01d12f2497ba4ca5314c5c1a2775b115ac7847e5380eaf3d2e8a8c8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\I3XI0K6BUK1BVX4BHT1I.temp
Filesize7KB
MD5ff651715671c5e8f33ab3c6e31a94dd4
SHA1921ab835bf13161ef5bc4273957ce60079616149
SHA25613eaae70d6334bfa4134121772ee68b5a30d27e604dabfce907da4d189191970
SHA512019d56638605a68a4b9b279fb45b79fce7a265d57e605346f89eeb593dc5b1eb9f28134fd382dd85d624b6a133da878eaa9a09dce5ea52f1f12b9cbe0a8c4e69