Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 17:17
Static task
static1
Behavioral task
behavioral1
Sample
RC2Bootstrapper.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RC2Bootstrapper.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
RC2Bootstrapper.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
RC2Bootstrapper.exe
Resource
win10v2004-20240709-en
General
-
Target
RC2Bootstrapper.exe
-
Size
154KB
-
MD5
baae212c86392bee9742d0bcddbe4f38
-
SHA1
7d65c52ff09fbaa2183b6cf00f5591575ef623a9
-
SHA256
7e155e4c91505705da62df4af04950d7461c1c2b1ce85137d845cfdc8cc10435
-
SHA512
b82826996a7ff383eeb8615df2f6ef2c3544e0fbc9dad6fa411bdeadeae17749414bc60201db57ba63ac1f183b16e59ab6dca4a4934373d20d40837f639e673c
-
SSDEEP
3072:x7LW6Pr46prwG2k5GlI1JWE9QVsxyvJyn4NTfQf1VZlfWhrn:xXWJ5kICW3Jyn4if1VZNi
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 2 IoCs
resource yara_rule behavioral4/files/0x000c0000000233ad-17.dat family_agenttesla behavioral4/memory/3732-20-0x00000000061E0000-0x00000000063F2000-memory.dmp family_agenttesla -
Executes dropped EXE 1 IoCs
pid Process 3732 RC2.exe -
Loads dropped DLL 2 IoCs
pid Process 3732 RC2.exe 3732 RC2.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS RC2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer RC2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion RC2.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3956 wrote to memory of 3732 3956 RC2Bootstrapper.exe 87 PID 3956 wrote to memory of 3732 3956 RC2Bootstrapper.exe 87 PID 3956 wrote to memory of 3732 3956 RC2Bootstrapper.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\RC2Bootstrapper.exe"C:\Users\Admin\AppData\Local\Temp\RC2Bootstrapper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\RC2\RC2.exe"RC2\RC2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
PID:3732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5c97f23b52087cfa97985f784ea83498f
SHA1d364618bec9cd6f8f5d4c24d3cc0f4c1a8e06b89
SHA256e658e8a5616245dbe655e194b59f1bb704aaeafbd0925d6eebbe70555a638cdd
SHA512ecfa83596f99afde9758d1142ff8b510a090cba6f42ba6fda8ca5e0520b658943ad85829a07bf17411e26e58432b74f05356f7eaeb3949a8834faa5de1a4f512
-
Filesize
11KB
MD5c63d4d9c2cab728a88f9c675ad7ac879
SHA142c84de57a3e9fc1ab41f02953b8c81f3a7a3333
SHA256b2668c676ecd2acf39d68486ec9d3c44955a388823b6d7e8f052066945078e7f
SHA512d40552e2e4ec9b0fe92c9e3f643430e473b00a38acb115c7dc7b4deb0d91016a0002d2676c7a0a9722cc3645ec97ed5f782bfe4d36f74b31a06508047d25c196