Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11/05/2024, 08:05 UTC
Static task
static1
Behavioral task
behavioral1
Sample
50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe
Resource
win10v2004-20240508-en
General
-
Target
50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe
-
Size
1.1MB
-
MD5
b769c82e7f0aeb48129c514b6ee3eefc
-
SHA1
19bd8f4cbd6422003331d9d2de11e3a7f973b0a3
-
SHA256
50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c
-
SHA512
97e5b8baf06b6f210cd8e9e8388963ea77b145b0192cb8af8ae7d5b088f0bdba7cedcd5100bdff61d64cb0a85bfbd69115a15e50ce4d0b7c4c43b8586098033d
-
SSDEEP
24576:tqDEvCTbMWu7rQYlBQcBiT6rprG8aGKSeHIqatQGNQp:tTvC/MTQYxsWR7aGKSeumGy
Malware Config
Extracted
Protocol: smtp- Host:
mail.deeptrans.com.tr - Port:
587 - Username:
lojistik@deeptrans.com.tr - Password:
59ace821A
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/3584-16-0x0000000002980000-0x00000000029D6000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-20-0x0000000004F20000-0x0000000004F74000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-22-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-39-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-57-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-81-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-79-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-77-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-75-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-73-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-71-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-69-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-67-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-65-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-63-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-61-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-59-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-55-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-53-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-49-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-47-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-45-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-43-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-41-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-37-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-35-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-33-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-31-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-29-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-27-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-25-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-23-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 behavioral2/memory/3584-51-0x0000000004F20000-0x0000000004F6F000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctsdvwT = "C:\\Users\\Admin\\AppData\\Roaming\\ctsdvwT\\ctsdvwT.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4904 set thread context of 3584 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3584 RegSvcs.exe 3584 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3584 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3584 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3584 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 85 PID 4904 wrote to memory of 3584 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 85 PID 4904 wrote to memory of 3584 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 85 PID 4904 wrote to memory of 3584 4904 50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe"C:\Users\Admin\AppData\Local\Temp\50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\50c24050cc83700989bbb281afd290df47f864702e0a957f1db1800a2c34b25c.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3584
-
Network
-
Remote address:8.8.8.8:53Requestmail.deeptrans.com.trIN AResponsemail.deeptrans.com.trIN A93.89.226.88
-
Remote address:8.8.8.8:53Request88.226.89.93.in-addr.arpaIN PTRResponse88.226.89.93.in-addr.arpaIN PTRwebmailfbscomtr88.226.89.93.in-addr.arpaIN PTR�7
-
Remote address:8.8.8.8:53Request71.31.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request77.190.18.2.in-addr.arpaIN PTRResponse77.190.18.2.in-addr.arpaIN PTRa2-18-190-77deploystaticakamaitechnologiescom
-
GEThttps://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90Remote address:2.17.196.137:443RequestGET /th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90 HTTP/2.0
host: www.bing.com
accept: */*
accept-encoding: gzip, deflate, br
user-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.102 Safari/537.36 Edge/18.19041
ResponseHTTP/2.0 200
content-type: image/png
access-control-allow-origin: *
access-control-allow-headers: *
access-control-allow-methods: GET, POST, OPTIONS
timing-allow-origin: *
report-to: {"group":"network-errors","max_age":604800,"endpoints":[{"url":"https://aefd.nelreports.net/api/report?cat=bingth"}]}
nel: {"report_to":"network-errors","max_age":604800,"success_fraction":0.001,"failure_fraction":1.0}
content-length: 1107
date: Sat, 11 May 2024 08:06:05 GMT
alt-svc: h3=":443"; ma=93600
x-cdn-traceid: 0.85c41102.1715414765.bbc22a2
-
Remote address:8.8.8.8:53Request137.196.17.2.in-addr.arpaIN PTRResponse137.196.17.2.in-addr.arpaIN PTRa2-17-196-137deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request86.23.85.13.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.164.165.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request2.36.159.162.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request24.121.18.2.in-addr.arpaIN PTRResponse24.121.18.2.in-addr.arpaIN PTRa2-18-121-24deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
598 B 827 B 10 9
-
2.17.196.137:443https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90tls, http21.5kB 6.3kB 17 11
HTTP Request
GET https://www.bing.com/th?id=OADD2.10239359720591_10PHTLBML42K6TRZO&pid=21.2&c=16&roil=0&roit=0&roir=1&roib=1&w=24&h=24&dynsize=1&qlt=90HTTP Response
200
-
67 B 83 B 1 1
DNS Request
mail.deeptrans.com.tr
DNS Response
93.89.226.88
-
71 B 117 B 1 1
DNS Request
88.226.89.93.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
71.31.126.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
77.190.18.2.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
137.196.17.2.in-addr.arpa
-
70 B 144 B 1 1
DNS Request
86.23.85.13.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
15.164.165.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 133 B 1 1
DNS Request
2.36.159.162.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
24.121.18.2.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa