Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
22s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
11/06/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
Byte Guard Free.exe
Resource
win10v2004-20240426-en
General
-
Target
Byte Guard Free.exe
-
Size
2.4MB
-
MD5
32eee970bec927fd068197918edac5a4
-
SHA1
8aa4820931aa228856f12fc516f886dab4d12e28
-
SHA256
53eeff9f4fa0473d90cf4abe978ff60d5898d2527924a593ef877303cab88a5b
-
SHA512
d47d2fbc9d4b9a47d0b5b1076aaa89b20ba72a9625e9fcfd57f000bc14abc11aff60123667bbb6998fa5bdff65b7207f410cc6008207fc2362db1d99c80afbe8
-
SSDEEP
49152:3Ls8e8SkGMITYbNbNWo4kSH3OqtwI2MrBm6w30IfRaRf:3PecGMIT4bNJFY3OqtxdmDDJef
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral1/memory/3520-6-0x0000000006770000-0x0000000006984000-memory.dmp family_agenttesla -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 31 discord.com 32 discord.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 ipinfo.io 6 ipinfo.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Byte Guard Free.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Byte Guard Free.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Byte Guard Free.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{382F5869-54D8-45E7-9BC1-7639A4C7FCA6} msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe 3520 Byte Guard Free.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3520 Byte Guard Free.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3520 wrote to memory of 4996 3520 Byte Guard Free.exe 87 PID 3520 wrote to memory of 4996 3520 Byte Guard Free.exe 87 PID 4996 wrote to memory of 4964 4996 msedge.exe 88 PID 4996 wrote to memory of 4964 4996 msedge.exe 88 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 5008 4996 msedge.exe 89 PID 4996 wrote to memory of 3928 4996 msedge.exe 90 PID 4996 wrote to memory of 3928 4996 msedge.exe 90 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91 PID 4996 wrote to memory of 4160 4996 msedge.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\Byte Guard Free.exe"C:\Users\Admin\AppData\Local\Temp\Byte Guard Free.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/g3pH5NZESD2⤵
- Enumerates system info in registry
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed05a46f8,0x7ffed05a4708,0x7ffed05a47183⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:23⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:33⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:83⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:13⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:13⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:13⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=4084 /prefetch:83⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1448,16909774341836557517,10118205404631120130,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3928 /prefetch:83⤵
- Modifies registry class
PID:1960
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1260
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4576
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
Filesize
6KB
MD565699be6a0881018dd0bdefb0edb6536
SHA1134069cbd875903f98d399307a607353d5c00dcd
SHA256a0c06c71cf13f4eb93dcfc7d40128adba1c3e4a3c0ac7962d586184768c6005c
SHA512d4d8660bf1c218d7a62fc3a677b4eda8d51f7f662a6ee37d9a28e235fc1cfb43713886aa793c06725fd1c640a4799d2a477d3ffd1d249739e406664f87bc0e74
-
Filesize
5KB
MD56a89868213c31a8323539592f8c17f3d
SHA1e2f1574146633e0d4e1a36634db4aa52f95c4b7d
SHA256d8ad8934a2d89270a982e0b58066b5a225b564e23842c629aea794ccc1c80e1a
SHA51279a2771ba8f5893e174e5e648c0205bf4e5d123a1b0874fd574d778c36aed121e6c5e2947352806dfb5e374fd2273dd0ff64f07b750c10d1cae553140c8b76cd
-
Filesize
10KB
MD59e2c8ecc9ec01f53702c63ce76f5cf95
SHA1aae54c49d652efdb4e13733844c9df633fdeca1f
SHA2564264ffa667c38bbefce77436017000a920df6b00776444543d8756e70e67bf97
SHA51236d0cfa7ee4f90e0618a61444e3641764f03c5c4da43bd0bc8c10a58a9469c900905eaa94a838daf112808bb2485445dc9597efd4504d2fcda6dcc4c6455ebf8