Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 22:11
Behavioral task
behavioral1
Sample
main.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
main.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
vulnera beta.exe
Resource
win7-20240705-en
General
-
Target
vulnera beta.exe
-
Size
603KB
-
MD5
041a42c2661d8f6ca11b614124682a68
-
SHA1
266af69167eef9b92ef4a5214872403a72da3ea7
-
SHA256
a60271c570816431df925eb4f2190aa8586f150aba27bd2149d3aa978ab8f1ab
-
SHA512
b68908681f856c08754718a3084ce03e7626ea417921a8672c680e41bb60f42fe42e14d80b9a5150d88f759ff80f09bfffd6acca128330bd20511c81c1f90aab
-
SSDEEP
12288:O/rv2JItJItJICCEhGSy0bhGSy00jjjjjbTAzMtr8Vx/cdVcd:craCExyaxyFjjjjjGYr8j/cdVcd
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 1 IoCs
resource yara_rule behavioral4/memory/228-6-0x0000000005870000-0x0000000005A82000-memory.dmp family_agenttesla -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4468 228 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vulnera beta.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS vulnera beta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer vulnera beta.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion vulnera beta.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\vulnera beta.exe = "11001" vulnera beta.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 228 vulnera beta.exe 228 vulnera beta.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\vulnera beta.exe"C:\Users\Admin\AppData\Local\Temp\vulnera beta.exe"1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:228 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 228 -s 21202⤵
- Program crash
PID:4468
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 228 -ip 2281⤵PID:5108