Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/07/2024, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER.exe
Resource
win7-20240708-en
General
-
Target
NEW ORDER.exe
-
Size
740KB
-
MD5
161eb73b1e04a20bad1b9f47716abe8d
-
SHA1
0fc916438fb79d83b1232a9c6913a599ffa5c641
-
SHA256
5ae71498e3b1d2707c84bcd6f43566b8834f310dccafd64ef81e54cbe7ac4b01
-
SHA512
1b27317105bf51911ad5e355bea51278dbf49d72365171eba914bfd612a40839490d073be4bd9974a9d51330c869b8aa18b88c860e19869249a533df18498d50
-
SSDEEP
12288:ADX3jNNQniCpB5A+W6nRHDWcVYuhi1xaDjuY+wuzaLWUrm9Osd:ADnjNNwrAU5DWcVZPDjuY+fznjH
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fakly-cambodia.com - Port:
587 - Username:
[email protected] - Password:
Mmhh#2014
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/664-20-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/664-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/664-15-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/664-23-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/664-14-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions NEW ORDER.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools NEW ORDER.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion NEW ORDER.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion NEW ORDER.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum NEW ORDER.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 NEW ORDER.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2420 set thread context of 664 2420 NEW ORDER.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2676 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 664 NEW ORDER.exe 2420 NEW ORDER.exe 664 NEW ORDER.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 664 NEW ORDER.exe Token: SeDebugPrivilege 2420 NEW ORDER.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2420 wrote to memory of 2676 2420 NEW ORDER.exe 32 PID 2420 wrote to memory of 2676 2420 NEW ORDER.exe 32 PID 2420 wrote to memory of 2676 2420 NEW ORDER.exe 32 PID 2420 wrote to memory of 2676 2420 NEW ORDER.exe 32 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34 PID 2420 wrote to memory of 664 2420 NEW ORDER.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ACopspA" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCE28.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51a356502b97a06f6c55531bb0609ebdf
SHA197d6b245603f731ac172cc9c18504e0dd43670eb
SHA256a5ac19444906dd27c1cc1d16cac539802ea82263d12837f3e33c533691be7e73
SHA512a4b71b13fb8fed50d4a5324c4ff8d5fa1c96b457a80998dad726ed5b6416925a93dad2e3153bb245b6af2a5f1ab52417e66a87fbcbe552f04c67d7968b2d9965