Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    64s
  • max time network
    65s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    21/05/2024, 05:59

General

  • Target

    3e02ed068e33bf8b1827f2108fb78224003df70055a6933717f4b8392faf17da.exe

  • Size

    1.3MB

  • MD5

    3303042547cb4d5dc136ffc5784fb9a6

  • SHA1

    e4eb7bd9a06e1ee4080140bf0cef295972978a39

  • SHA256

    3e02ed068e33bf8b1827f2108fb78224003df70055a6933717f4b8392faf17da

  • SHA512

    d251747d91b290195ae2d56e7034eff6dfdfb248b63bb00f18b8321f044941bfca80a357ded22dba7830f74e87928e80d6cc12754b191a4f7579d34c7fbe3809

  • SSDEEP

    24576:66EpKkF3Vy05wYK7WUTkH6s5KtDhLZK8/GBRDEMY3y0NjA1d2cO:FPbZ5hLIzBRD18HNjA1drO

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.svetigeorgije.co.rs
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    4c5H&b2whkD9

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 47 IoCs
  • Suspicious use of SendNotifyMessage 47 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e02ed068e33bf8b1827f2108fb78224003df70055a6933717f4b8392faf17da.exe
    "C:\Users\Admin\AppData\Local\Temp\3e02ed068e33bf8b1827f2108fb78224003df70055a6933717f4b8392faf17da.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
      2⤵
        PID:2780
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
        2⤵
        • Accesses Microsoft Outlook profiles
        • Suspicious use of AdjustPrivilegeToken
        • outlook_office_path
        • outlook_win_path
        PID:2920
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
        2⤵
          PID:2844
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe"
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:3004
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Windows\system32\shutdown.exe
          shutdown -r -t 0
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1980
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        1⤵
          PID:852
        • C:\Windows\system32\LogonUI.exe
          "LogonUI.exe" /flags:0x1
          1⤵
            PID:1756

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2068-0-0x000007FEF57C3000-0x000007FEF57C4000-memory.dmp

            Filesize

            4KB

          • memory/2068-1-0x00000000004B0000-0x00000000004C0000-memory.dmp

            Filesize

            64KB

          • memory/2068-2-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

            Filesize

            9.9MB

          • memory/2068-3-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

            Filesize

            9.9MB

          • memory/2068-4-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

            Filesize

            9.9MB

          • memory/2068-5-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

            Filesize

            9.9MB

          • memory/2068-6-0x000000001A600000-0x000000001A682000-memory.dmp

            Filesize

            520KB

          • memory/2068-26-0x000007FEF57C0000-0x000007FEF61AC000-memory.dmp

            Filesize

            9.9MB

          • memory/2780-9-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2780-12-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2780-11-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2780-7-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2920-25-0x000000007459E000-0x000000007459F000-memory.dmp

            Filesize

            4KB

          • memory/2920-22-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2920-24-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2920-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2920-20-0x0000000000400000-0x0000000000430000-memory.dmp

            Filesize

            192KB

          • memory/2920-27-0x0000000074590000-0x0000000074C7E000-memory.dmp

            Filesize

            6.9MB

          • memory/2920-28-0x000000007459E000-0x000000007459F000-memory.dmp

            Filesize

            4KB

          • memory/2920-29-0x0000000074590000-0x0000000074C7E000-memory.dmp

            Filesize

            6.9MB

          • memory/2920-32-0x0000000074590000-0x0000000074C7E000-memory.dmp

            Filesize

            6.9MB

          • memory/3004-30-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB

          • memory/3004-31-0x0000000140000000-0x00000001405E8000-memory.dmp

            Filesize

            5.9MB