Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21/05/2024, 14:17
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Document.exe
Resource
win7-20240221-en
General
-
Target
Shipping Document.exe
-
Size
748KB
-
MD5
a7666685c69267f2f9108e319cd0cd38
-
SHA1
feac316461451bcaf6a64ea92217ad8046808844
-
SHA256
52adc27e384cb4ae0d0e096792526ca660f8b2a42e60d69ffd44e67def0fcf12
-
SHA512
49ad3a8d3a2ebf64c9feaddf916c2c20466bc355116177c81eaf045b251a2e034154832f60b9d40cde2b919e9d818bef3fc97588f95ab455af3971d823a1ddf0
-
SSDEEP
12288:Tzln6yWn7fcpVZlu/6uHKbRLj4+62FGPstWYfMXmxk5QI7O/125khKzwcY+Dw3:Nn698VVYeLL62F0+WGam2qnUkwzwcQ
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.diginetbd.net - Port:
587 - Username:
[email protected] - Password:
efs321##@@ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2528 powershell.exe 2780 powershell.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1308 set thread context of 2052 1308 Shipping Document.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2152 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1308 Shipping Document.exe 1308 Shipping Document.exe 2052 RegSvcs.exe 2052 RegSvcs.exe 2528 powershell.exe 2780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1308 Shipping Document.exe Token: SeDebugPrivilege 2052 RegSvcs.exe Token: SeDebugPrivilege 2528 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1308 wrote to memory of 2528 1308 Shipping Document.exe 28 PID 1308 wrote to memory of 2528 1308 Shipping Document.exe 28 PID 1308 wrote to memory of 2528 1308 Shipping Document.exe 28 PID 1308 wrote to memory of 2528 1308 Shipping Document.exe 28 PID 1308 wrote to memory of 2780 1308 Shipping Document.exe 30 PID 1308 wrote to memory of 2780 1308 Shipping Document.exe 30 PID 1308 wrote to memory of 2780 1308 Shipping Document.exe 30 PID 1308 wrote to memory of 2780 1308 Shipping Document.exe 30 PID 1308 wrote to memory of 2152 1308 Shipping Document.exe 31 PID 1308 wrote to memory of 2152 1308 Shipping Document.exe 31 PID 1308 wrote to memory of 2152 1308 Shipping Document.exe 31 PID 1308 wrote to memory of 2152 1308 Shipping Document.exe 31 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34 PID 1308 wrote to memory of 2052 1308 Shipping Document.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Shipping Document.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YbgpVCrkLOfji.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YbgpVCrkLOfji" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBA89.tmp"2⤵
- Creates scheduled task(s)
PID:2152
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f43ed738fbf755ea71bc49dee1822139
SHA144ece71104b374499cc4fe1c50e6b92f89a9fd36
SHA2563fa51aaf4c4ad47d003f5e0ac801152abeae8a95bfd6785898dbee4d4a007768
SHA512f871bcfe096f51e78baa9b2c0403066673baa471cc957ac6491eb97a4a1e2e0f42321b4a7b188a71933552742c37922d72b6144583b618f59d8b5b28c38673fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d95e58bd42fe9d08e25165fd7a0febdf
SHA1eb933121ca329a47952e744f26d964661bff0f0d
SHA256ca475b8fae9d2ff961a715effc92d7cc4d96eca0e47670058940904949ca6b27
SHA51261343ee4a614aa0759c8c05d0c6b08f46732e7afa18edc6893bec4b289f8391a6b5c93d5b1ff78e93d4f86cc4740c1c0e0fbdc530e716f4bff02159ecedcd983