Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
27/05/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents inv. 523435300XX.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Shipping Documents inv. 523435300XX.exe
Resource
win10v2004-20240508-en
General
-
Target
Shipping Documents inv. 523435300XX.exe
-
Size
1.1MB
-
MD5
efae427357884a8d496facd0298f6af8
-
SHA1
a69384c7d0d889050d55e557b51e97aa8a3554f7
-
SHA256
b86258bbf5182d3da8292cbff6262a90cef9dd418fd8b6706fde5747662da2ae
-
SHA512
fa5c041de19a1c812351cad0eb2b040677584969838f37e4e752e9abb85c9db78488f5371015d08e39a33dcbddbc9292f28da23fddea1c5dbfab1ea252ef3a52
-
SSDEEP
24576:NAHnh+eWsN3skA4RV1Hom2KXMmHazOnIiLQiAQJGyzq925:sh+ZkldoPK8YazOIiLQiRYyzV
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2297530677-1229052932-2803917579-1000\Software\Microsoft\Windows\CurrentVersion\Run\jBpFfg = "C:\\Users\\Admin\\AppData\\Roaming\\jBpFfg\\jBpFfg.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3024 set thread context of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2616 RegSvcs.exe 2616 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2240 Shipping Documents inv. 523435300XX.exe 3024 Shipping Documents inv. 523435300XX.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2616 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2240 Shipping Documents inv. 523435300XX.exe 2240 Shipping Documents inv. 523435300XX.exe 3024 Shipping Documents inv. 523435300XX.exe 3024 Shipping Documents inv. 523435300XX.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2240 Shipping Documents inv. 523435300XX.exe 2240 Shipping Documents inv. 523435300XX.exe 3024 Shipping Documents inv. 523435300XX.exe 3024 Shipping Documents inv. 523435300XX.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 1664 2240 Shipping Documents inv. 523435300XX.exe 28 PID 2240 wrote to memory of 3024 2240 Shipping Documents inv. 523435300XX.exe 29 PID 2240 wrote to memory of 3024 2240 Shipping Documents inv. 523435300XX.exe 29 PID 2240 wrote to memory of 3024 2240 Shipping Documents inv. 523435300XX.exe 29 PID 2240 wrote to memory of 3024 2240 Shipping Documents inv. 523435300XX.exe 29 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30 PID 3024 wrote to memory of 2616 3024 Shipping Documents inv. 523435300XX.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"2⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD53f047303760afca71ab384fa17c9bc3c
SHA14ee410854754514bdedef869996a4bd60ce523b2
SHA25694c2055511abb4977ef0dfaa86c31eddd5b33a3c54a36f80d22a4fdebab94603
SHA5126fdcc7eb1fb84aaae3cf353758a46a84ede5ac76d88281f2c8f971240139f92ff2d1bcdeec7f7bfbd7f88322a23e38b4660d5bf29cff5e7bc9c7bdb790b1bf37
-
Filesize
262KB
MD5d5502a154cda81ef84937cbadfb0b903
SHA10d71ed2fd1095d422c4869618ce6820b5e2d32c4
SHA256a7d3016a4769b885f55436a7dd9fae812ae34ef256fe339dd18d170db05e6344
SHA5122a9c362aefe1967987be6e654041a6cc89af876647f8d14d216f016caca8e42c0b64ca744ae5b443e090d5a18f8720e7726f001859c97e6515d531ef9951f923