Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 17:49
Static task
static1
Behavioral task
behavioral1
Sample
SOA.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
SOA.exe
Resource
win10v2004-20240611-en
General
-
Target
SOA.exe
-
Size
1.2MB
-
MD5
a6e9d4fa94edb21aa16b167dfec4f624
-
SHA1
1b9f0d78dd27baa672c3d904b8bb0e8e9bdf7117
-
SHA256
f0a931ba453d846bac36ab75d1e79847170cd8f562ccb117e92133434d301abf
-
SHA512
1f64657ca18349d7977797b47414969494ab914387d1175b1cfeae4cda4f066111059eec2aa66fcf8333398934e764c740ee2d71453ada91fcd71c6a8c66bc64
-
SSDEEP
24576:/AHnh+eWsN3skA4RV1Hom2KXMmHaWe2HXtKxksRk9bEC5:ih+ZkldoPK8YaWegt+RR8d
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3169499791-3545231813-3156325206-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\boqXv = "C:\\Users\\Admin\\AppData\\Roaming\\boqXv\\boqXv.exe" RegSvcs.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1508 set thread context of 4476 1508 SOA.exe 85 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4476 RegSvcs.exe 4476 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1508 SOA.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4476 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1508 SOA.exe 1508 SOA.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1508 SOA.exe 1508 SOA.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4476 1508 SOA.exe 85 PID 1508 wrote to memory of 4476 1508 SOA.exe 85 PID 1508 wrote to memory of 4476 1508 SOA.exe 85 PID 1508 wrote to memory of 4476 1508 SOA.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOA.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\SOA.exe"2⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD5e9f5b1621a3cd5ae5586187289804b7c
SHA1b455b4248a956d6a6907a9e00e9e8a37c808154c
SHA256d86d071e35fcedc86965dcb306d2bff1971d34f8212122f7bc7363e8d95bfdd8
SHA5128bba19758778578340f307d37b4128840a0794b69c1f271c8c89e8e2bde828cbc9920ea5f2200f35338986c73d647c4ae743ea812c4cf86ac700d95ceb182b11