Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    190s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 11:50

General

  • Target

    ug.exe

  • Size

    3.5MB

  • MD5

    c02f0310508709cb3a7f7e414cc98115

  • SHA1

    799ca2eadb0f5aab0c3a68f8ed260988c193d23f

  • SHA256

    675f36891fedbe18f4a551818d762790a17138d9c2ac57f4bb2ff45abc146507

  • SHA512

    f951df3b93cb6007fb927c345bf33e5487279bf1dca795f5e798fe9c580a67431cf817c564b7152d1f545a327a43466ce10725ddafe60ac672ab31a4ae142cbc

  • SSDEEP

    98304:IaIVmRrKA+NrLOgq1oVIC8ykQEg+bYTWwXptBv4EPk7X1Qz:1IYR4Kgq1eR8SKwZXvBPeaz

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • AgentTesla payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ug.exe
    "C:\Users\Admin\AppData\Local\Temp\ug.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\AppData\Local\Temp\~sfx0022F60E94\KHAN x CHEATS.exe
      "C:\Users\Admin\AppData\Local\Temp\~sfx0022F60E94\KHAN x CHEATS.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Modifies system certificate store
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2792
      • C:\Windows\system32\cmd.exe
        "cmd.exe" /c start cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\system32\cmd.exe
          cmd /C "color b && title Error && echo You must run the function KeyAuthApp.init(); first && timeout /t 5"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2504
          • C:\Windows\system32\timeout.exe
            timeout /t 5
            5⤵
            • Delays execution with timeout.exe
            PID:2488

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    922fc9c1e9e17a943fb30d16ade671b2

    SHA1

    e12ca1712b7480efdb926be71278ef672f3da306

    SHA256

    bff1024634fe666025a7b3413f50ff57a075661d198a29c8f3cfc7d184a65a04

    SHA512

    6bb53b8293a308447224237dd213d4516afcdc122187b7523d0ffaa6c85231fed27c4d660ae409bd24ec394cf2651daabfb69001e2e9c746992912e83dda17f1

  • C:\Users\Admin\AppData\Local\Temp\Cab7042.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar70B2.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\~sfx0022F60E94\Guna.UI2.dll

    Filesize

    2.1MB

    MD5

    c19e9e6a4bc1b668d19505a0437e7f7e

    SHA1

    73be712aef4baa6e9dabfc237b5c039f62a847fa

    SHA256

    9ac8b65e5c13292a8e564187c1e7446adc4230228b669383bd7b07035ab99a82

    SHA512

    b6cd0af436459f35a97db2d928120c53d3691533b01e4f0e8b382f2bd81d9a9a2c57e5e2aa6ade9d6a1746d5c4b2ef6c88d3a0cf519424b34445d0d30aab61de

  • C:\Users\Admin\AppData\Local\Temp\~sfx0022F60E94\KHAN x CHEATS.exe

    Filesize

    4.1MB

    MD5

    83ccf8905ca94e63a0edbec1cd4955f7

    SHA1

    f3c9231780bfa30ead089a6eaf055b944f8289b9

    SHA256

    c1db115b69ab6d3f28080a867989f4aff44464b6140af10e90d00a7b6cfa2c02

    SHA512

    5657a740be2e5fae15c18d00cd1a2bd3a88ceebe6fb155ff26884314f094e680d0afd2112caa7c12e024294b0b6f26f8a5333a831f2500779a0d0ddfb05c4a3e

  • C:\Users\Admin\AppData\Local\Temp\~sfx0022F60E94\KHAN x CHEATS.exe.config

    Filesize

    565B

    MD5

    98dbb4a9bc384dca6b79a47886c42891

    SHA1

    028caef2a44a0bfc41ef8f0c7149952ff1022a01

    SHA256

    4e12056f6c6ff7d05f4dfd957586aeb41fe563677c57ae2fc43aff8aa2bcf970

    SHA512

    fabca42ffbba0e98ca5d90a95d2d849d27e42614b0c5dd6387e1994b7794e009fe27d060f26950527a614eb67319c12c2bc52563f975bfd4f570d5f7e58ee71e

  • C:\Users\Admin\AppData\Local\Temp\~sfx0022F60E94\KHAN x CHEATS.pdb

    Filesize

    159KB

    MD5

    be46313ca3e6c9246b52784b4ce64442

    SHA1

    db2d8e87f9fd9f650957b2fae9e4a720abf2daa5

    SHA256

    97a4017b637e86fd05447f0529cc99d99ce8341b64ac17edd0dcd058522f95ee

    SHA512

    ecdfdc9a09c2487d176148404ec469ae8ca468537733e5dbaea30e6c35e39fba16f57952c6132bdc400145010ab804755357efb7094299a9048bb851579af569

  • memory/2792-45-0x000000001BF00000-0x000000001C114000-memory.dmp

    Filesize

    2.1MB

  • memory/2792-48-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-47-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-46-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-43-0x0000000000A10000-0x0000000000E26000-memory.dmp

    Filesize

    4.1MB

  • memory/2792-122-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

    Filesize

    4KB

  • memory/2792-123-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-125-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-126-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2792-41-0x000007FEF5A63000-0x000007FEF5A64000-memory.dmp

    Filesize

    4KB

  • memory/2792-146-0x000007FEF5A60000-0x000007FEF644C000-memory.dmp

    Filesize

    9.9MB

  • memory/2808-124-0x0000000000400000-0x0000000000E5A000-memory.dmp

    Filesize

    10.4MB

  • memory/2808-175-0x0000000000400000-0x0000000000E5A000-memory.dmp

    Filesize

    10.4MB