Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 11:00
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240708-en
General
-
Target
MalwareBazaar.exe
-
Size
714KB
-
MD5
3f7c84c76dfaea941ef90605c1cd21ba
-
SHA1
992ece1862127ed2ca5ca313238919c329498d24
-
SHA256
fb37e9bdbfbb7d761432783f5a1c9da901542426bb386bb611c9ac5f2b8ad8fc
-
SHA512
6d4697e38e5e8ef4aa2f04ed5edd827da9ef20b4b1afa54570fa39187da93f9e947b02f7475ec334e56777f837650d6ba9093af07e55d96e81b6d068dc41d1e4
-
SSDEEP
12288:yfpWOhxz036s1YPTzJonZtC1bqqAv6vbTwjHsX8f+FIDAM839:yj9036skJWCtqqAowHG5Ft9
Malware Config
Extracted
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$
Extracted
agenttesla
Protocol: smtp- Host:
cp5ua.hyperhost.ua - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@#$ - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1036 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000\Control Panel\International\Geo\Nation MalwareBazaar.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4556 set thread context of 2360 4556 MalwareBazaar.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4556 MalwareBazaar.exe 1036 powershell.exe 4556 MalwareBazaar.exe 1036 powershell.exe 2360 MalwareBazaar.exe 2360 MalwareBazaar.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4556 MalwareBazaar.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 2360 MalwareBazaar.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4556 wrote to memory of 1036 4556 MalwareBazaar.exe 93 PID 4556 wrote to memory of 1036 4556 MalwareBazaar.exe 93 PID 4556 wrote to memory of 1036 4556 MalwareBazaar.exe 93 PID 4556 wrote to memory of 1544 4556 MalwareBazaar.exe 95 PID 4556 wrote to memory of 1544 4556 MalwareBazaar.exe 95 PID 4556 wrote to memory of 1544 4556 MalwareBazaar.exe 95 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97 PID 4556 wrote to memory of 2360 4556 MalwareBazaar.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\niCncTvOtZ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\niCncTvOtZ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCCD5.tmp"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD560c15cf13c91ee789c9298843ecf1e7f
SHA14ae910fab364449f2800956f64159afd565f1218
SHA2564f2645dd80ac11b44d09b64f33aeddfd6183995e7fe1491e31868ae76b6477a6
SHA512a2aaa8d69f04a177c1681eaeec0931890a03ce9889225a5f49b58cbef570f2aca1077c3924ecdd417f94350202e7532d2e51c661838bbaec910cbd6dd6195e06