Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04/06/2024, 12:44
Static task
static1
Behavioral task
behavioral1
Sample
STATEMENT OF ACCOUNT.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
STATEMENT OF ACCOUNT.exe
Resource
win10v2004-20240508-en
General
-
Target
STATEMENT OF ACCOUNT.exe
-
Size
779KB
-
MD5
c3245f5ed1ef3b1fa4065c8cb4cd27c8
-
SHA1
f3bfaf829add69d1c39a5045fba5faa02b345f20
-
SHA256
113e56cc0bb3dca13bf13c0e47a25b102b4f8e7af8b156fc7e6fcd76ba40c8ff
-
SHA512
6a9760e20b5114c56cd31cba377f9fa54812dab6e4e90f533a214b88a519e89c85a84249e02458b7a060635f755833f006134d064b828b73fc3cd36dd228d818
-
SSDEEP
12288:GQt+5v4c5nvCRzsgfZ+E40r9RqTBtF3Q0XsKNr+u9Y6vdjTOM5H0dG1qqQ24FPzn:0BtF3Q0XLCuy6vpfOeH1eCrXW
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.springandsummer.lk - Port:
587 - Username:
[email protected] - Password:
anu##323 - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1860 powershell.exe 1436 powershell.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2936 set thread context of 1308 2936 STATEMENT OF ACCOUNT.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1548 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2936 STATEMENT OF ACCOUNT.exe 2936 STATEMENT OF ACCOUNT.exe 2936 STATEMENT OF ACCOUNT.exe 2936 STATEMENT OF ACCOUNT.exe 2936 STATEMENT OF ACCOUNT.exe 2936 STATEMENT OF ACCOUNT.exe 1436 powershell.exe 1860 powershell.exe 2936 STATEMENT OF ACCOUNT.exe 1308 RegSvcs.exe 1308 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2936 STATEMENT OF ACCOUNT.exe Token: SeDebugPrivilege 1436 powershell.exe Token: SeDebugPrivilege 1860 powershell.exe Token: SeDebugPrivilege 1308 RegSvcs.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2936 wrote to memory of 1860 2936 STATEMENT OF ACCOUNT.exe 28 PID 2936 wrote to memory of 1860 2936 STATEMENT OF ACCOUNT.exe 28 PID 2936 wrote to memory of 1860 2936 STATEMENT OF ACCOUNT.exe 28 PID 2936 wrote to memory of 1860 2936 STATEMENT OF ACCOUNT.exe 28 PID 2936 wrote to memory of 1436 2936 STATEMENT OF ACCOUNT.exe 30 PID 2936 wrote to memory of 1436 2936 STATEMENT OF ACCOUNT.exe 30 PID 2936 wrote to memory of 1436 2936 STATEMENT OF ACCOUNT.exe 30 PID 2936 wrote to memory of 1436 2936 STATEMENT OF ACCOUNT.exe 30 PID 2936 wrote to memory of 1548 2936 STATEMENT OF ACCOUNT.exe 31 PID 2936 wrote to memory of 1548 2936 STATEMENT OF ACCOUNT.exe 31 PID 2936 wrote to memory of 1548 2936 STATEMENT OF ACCOUNT.exe 31 PID 2936 wrote to memory of 1548 2936 STATEMENT OF ACCOUNT.exe 31 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34 PID 2936 wrote to memory of 1308 2936 STATEMENT OF ACCOUNT.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\STATEMENT OF ACCOUNT.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\uZkgoYezLmlkkl.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1436
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uZkgoYezLmlkkl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6EAF.tmp"2⤵
- Creates scheduled task(s)
PID:1548
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1KB
MD579e84edcc5160b3839c0c59e364efb6c
SHA19da859822d57bf0620bb97310baf8e739f292ce9
SHA25639a734666a100f2d92c597cd65e7732c41ad9dd5f5791a216f5f07481878fb52
SHA512e0f64bf08be7ebc87a87e10ec55328c55635a1a5e7696f11aa7a379e29d03cae58e479843442b2f17e317aa71ffdcc38a3acbbcfbed5f2e786ef50c619d06629
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\FNIRH5L7MTN3RH5KY3FN.temp
Filesize7KB
MD563fe584cebd8bbb48a3fd9313c559e92
SHA12eb21c73b0bc656842ecc24e8d68d4361fa9ce9a
SHA256fb826b3429440254e6af883d51874bf316c2c65f3459b01d7e6c5c4f34c3010f
SHA512d8e51bd58b3a06876bed634b99cd97f84e6a05d7486d9b03a85097093835d3ce6c3f4e18b47b70526e745463582fa912d1e4acb0fe3812e123bfafbd3f66950a