Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 16:33
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents inv. 523435300XX.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Shipping Documents inv. 523435300XX.exe
Resource
win10v2004-20240508-en
General
-
Target
Shipping Documents inv. 523435300XX.exe
-
Size
1.1MB
-
MD5
efae427357884a8d496facd0298f6af8
-
SHA1
a69384c7d0d889050d55e557b51e97aa8a3554f7
-
SHA256
b86258bbf5182d3da8292cbff6262a90cef9dd418fd8b6706fde5747662da2ae
-
SHA512
fa5c041de19a1c812351cad0eb2b040677584969838f37e4e752e9abb85c9db78488f5371015d08e39a33dcbddbc9292f28da23fddea1c5dbfab1ea252ef3a52
-
SSDEEP
24576:NAHnh+eWsN3skA4RV1Hom2KXMmHazOnIiLQiAQJGyzq925:sh+ZkldoPK8YazOIiLQiRYyzV
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jBpFfg = "C:\\Users\\Admin\\AppData\\Roaming\\jBpFfg\\jBpFfg.exe" RegSvcs.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4272 set thread context of 4588 4272 Shipping Documents inv. 523435300XX.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4588 RegSvcs.exe 4588 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4272 Shipping Documents inv. 523435300XX.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4588 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4272 Shipping Documents inv. 523435300XX.exe 4272 Shipping Documents inv. 523435300XX.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4272 Shipping Documents inv. 523435300XX.exe 4272 Shipping Documents inv. 523435300XX.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4272 wrote to memory of 4588 4272 Shipping Documents inv. 523435300XX.exe 85 PID 4272 wrote to memory of 4588 4272 Shipping Documents inv. 523435300XX.exe 85 PID 4272 wrote to memory of 4588 4272 Shipping Documents inv. 523435300XX.exe 85 PID 4272 wrote to memory of 4588 4272 Shipping Documents inv. 523435300XX.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents inv. 523435300XX.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5d5502a154cda81ef84937cbadfb0b903
SHA10d71ed2fd1095d422c4869618ce6820b5e2d32c4
SHA256a7d3016a4769b885f55436a7dd9fae812ae34ef256fe339dd18d170db05e6344
SHA5122a9c362aefe1967987be6e654041a6cc89af876647f8d14d216f016caca8e42c0b64ca744ae5b443e090d5a18f8720e7726f001859c97e6515d531ef9951f923