Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 05:49
Static task
static1
Behavioral task
behavioral1
Sample
thong bao hang den 20233_7758797443.scr.exe
Resource
win7-20240705-en
General
-
Target
thong bao hang den 20233_7758797443.scr.exe
-
Size
832KB
-
MD5
a0118a3cddf21d595f3bf9e4bc3852e0
-
SHA1
ef7e6d08b5449b1916ba4f4a6398b8aaf92a6773
-
SHA256
e99c78b791adc8b4b317e5c8a3a6666a5f62e29c8ebc6d19b3999d647f39a320
-
SHA512
1eeed2a0b1aca9955d8d646812bfb43855458e83112c16963dc3836e26c639b318e9bd74f672d27f640b15ff9a2290bdc1680c42fae305031ad0e5813033b703
-
SSDEEP
24576:x8W8Fqux3mW0lbIodRMPE5DkWUMK7Lhqut2Ks:x8W8N3mZlrM81kNMWdqibs
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.groupmt.vn - Port:
587 - Username:
[email protected] - Password:
4j37SF2n8e - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2844 powershell.exe 2768 powershell.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2272 set thread context of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2176 thong bao hang den 20233_7758797443.scr.exe 2176 thong bao hang den 20233_7758797443.scr.exe 2768 powershell.exe 2844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2176 thong bao hang den 20233_7758797443.scr.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeDebugPrivilege 2844 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2176 thong bao hang den 20233_7758797443.scr.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2272 wrote to memory of 2844 2272 thong bao hang den 20233_7758797443.scr.exe 30 PID 2272 wrote to memory of 2844 2272 thong bao hang den 20233_7758797443.scr.exe 30 PID 2272 wrote to memory of 2844 2272 thong bao hang den 20233_7758797443.scr.exe 30 PID 2272 wrote to memory of 2844 2272 thong bao hang den 20233_7758797443.scr.exe 30 PID 2272 wrote to memory of 2768 2272 thong bao hang den 20233_7758797443.scr.exe 32 PID 2272 wrote to memory of 2768 2272 thong bao hang den 20233_7758797443.scr.exe 32 PID 2272 wrote to memory of 2768 2272 thong bao hang den 20233_7758797443.scr.exe 32 PID 2272 wrote to memory of 2768 2272 thong bao hang den 20233_7758797443.scr.exe 32 PID 2272 wrote to memory of 2904 2272 thong bao hang den 20233_7758797443.scr.exe 34 PID 2272 wrote to memory of 2904 2272 thong bao hang den 20233_7758797443.scr.exe 34 PID 2272 wrote to memory of 2904 2272 thong bao hang den 20233_7758797443.scr.exe 34 PID 2272 wrote to memory of 2904 2272 thong bao hang den 20233_7758797443.scr.exe 34 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36 PID 2272 wrote to memory of 2176 2272 thong bao hang den 20233_7758797443.scr.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\thong bao hang den 20233_7758797443.scr.exe"C:\Users\Admin\AppData\Local\Temp\thong bao hang den 20233_7758797443.scr.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\thong bao hang den 20233_7758797443.scr.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\jiwAFuDlQZwAw.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jiwAFuDlQZwAw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB117.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\thong bao hang den 20233_7758797443.scr.exe"C:\Users\Admin\AppData\Local\Temp\thong bao hang den 20233_7758797443.scr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52db618dcd0de227800944c97a4060e14
SHA1de69e6e95fe7d705f98292026acc05e328d1cfb1
SHA25629d96623a3f7f3d024796de71db863dc6ab41c079f2dd68ecfc39a1662068793
SHA5124146abf849d2edf87d3cd9031ce08c1f4698568797c96417ca410d7f0c8de8155368a95563e5975240a06f1ea55d41bed8605b2b32f4ac3e89d547f14e3f6e0f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5c734f34b0ae4fa00e602e7d3bfffeee0
SHA16e20db966f5c01636746cbd9409265a9f7f22040
SHA2565b5fab50b3ccc5a7c887e3ecbe510eaa7a3a33a44d10c129a5836c599d9bf0a4
SHA512d315fc78cc1e4a85080f8106d7385c8dfb58e167f102cb4e43c81280903da4dd803ddb94c389c7ae7a00b4b1f5e7200cfcf39bddeac6f73cca2d23f498099cc4