Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30/05/2024, 15:26 UTC
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe
Resource
win10v2004-20240426-en
General
-
Target
SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe
-
Size
1.1MB
-
MD5
349d723ecd0a2370dd03befb829bbfe2
-
SHA1
91035d07ec0a4f68cdf21a346f08a36c251cf553
-
SHA256
713d258a9f5522e345d7ecf7b82e2f69c8eaf53536ccb9d582e27d0d981861fb
-
SHA512
68e7fe24bae4a7e7e7272e37013e9d852d43a7d025bcec8354bca30ff7873f0ae5495cad39ad02fae8a43c9711ecdcddd871e12bd1d95c9d6874bb81f77bbdd1
-
SSDEEP
24576:bAHnh+eWsN3skA4RV1Hom2KXMmHam7t1SkxMEpXCm1cv7H5:2h+ZkldoPK8Yam7zS0npSmqvN
Malware Config
Extracted
agenttesla
https://api.telegram.org/bot5704903332:AAGQ75Wg6lHVUpPODprifDQYP0_98wUeols/
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org 6 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1984 set thread context of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 888 RegSvcs.exe 888 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 888 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29 PID 1984 wrote to memory of 888 1984 SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.AutoIt.1390.21633.8031.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
Network
-
Remote address:8.8.8.8:53Requestapi.ipify.orgIN AResponseapi.ipify.orgIN A172.67.74.152api.ipify.orgIN A104.26.13.205api.ipify.orgIN A104.26.12.205
-
Remote address:172.67.74.152:443RequestGET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
Host: api.ipify.org
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain
Content-Length: 14
Connection: keep-alive
Vary: Origin
CF-Cache-Status: DYNAMIC
Server: cloudflare
CF-RAY: 88bfbdd7bdcb7786-LHR
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
Remote address:208.95.112.1:80RequestGET /line/?fields=hosting HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 6
Access-Control-Allow-Origin: *
X-Ttl: 55
X-Rl: 43
-
1.0kB 5.7kB 11 11
HTTP Request
GET https://api.ipify.org/HTTP Response
200 -
264 B 307 B 4 3
HTTP Request
GET http://ip-api.com/line/?fields=hostingHTTP Response
200
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5a919781d7c42fb911b1ea668f7606c06
SHA18f8eb180558b2a207ab50ee34ddfb649a5f975b8
SHA25676bf59223dc44cbbcdebd307d450aad401731fbd5a1649d1c6840ce668faa055
SHA51267941697498177a82063f5064b5cda2a9849d6445339c5707d3e91beda263305b63f10ac25a576bfda34080089ef5e11d29576c142c2c54e84df623f6377b6be