Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
105s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/09/2024, 14:53 UTC
Static task
static1
Behavioral task
behavioral1
Sample
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
Resource
win10v2004-20240802-en
General
-
Target
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe
-
Size
631KB
-
MD5
00261db2bfac32edfbdbf38b51370c13
-
SHA1
6de5e2fcfb1f6195d6b241da62b9c9888f0ca44f
-
SHA256
9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68
-
SHA512
a9c4602fd38f366077d851b89f793be0b2f44b7dd306590b62b4a8ee53b3bf6c828f060bc7305539ecce133a255c8f04b8d3200c61750183f50619fc620e2dac
-
SSDEEP
12288:RwfufVLrggT2l/PhteSmaYmpMMnFMc4v3CPkQgdOeXk/U:Rw0V/gG8/PhtqaY2FgOck/U
Malware Config
Extracted
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
testlab@apexrnun.com - Password:
%qroUozO;(C2Rlyb
Extracted
agenttesla
Protocol: smtp- Host:
mail.apexrnun.com - Port:
587 - Username:
testlab@apexrnun.com - Password:
%qroUozO;(C2Rlyb - Email To:
testbox@apexrnun.com
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4652 set thread context of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1796 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 1796 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1796 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86 PID 4652 wrote to memory of 1796 4652 9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe"C:\Users\Admin\AppData\Local\Temp\9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe"C:\Users\Admin\AppData\Local\Temp\9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1796
-
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request97.17.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request81.144.22.2.in-addr.arpaIN PTRResponse81.144.22.2.in-addr.arpaIN PTRa2-22-144-81deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Requestip-api.comIN AResponseip-api.comIN A208.95.112.1
-
GEThttp://ip-api.com/line/?fields=hosting9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exeRemote address:208.95.112.1:80RequestGET /line/?fields=hosting HTTP/1.1
Host: ip-api.com
Connection: Keep-Alive
ResponseHTTP/1.1 200 OK
Content-Type: text/plain; charset=utf-8
Content-Length: 6
Access-Control-Allow-Origin: *
X-Ttl: 60
X-Rl: 44
-
Remote address:8.8.8.8:53Request75.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.112.95.208.in-addr.arpaIN PTRResponse1.112.95.208.in-addr.arpaIN PTRip-apicom
-
Remote address:8.8.8.8:53Requestmail.apexrnun.comIN AResponsemail.apexrnun.comIN A185.196.9.150
-
Remote address:8.8.8.8:53Request150.9.196.185.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request104.219.191.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request196.249.167.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request198.187.3.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request217.135.221.88.in-addr.arpaIN PTRResponse217.135.221.88.in-addr.arpaIN PTRa88-221-135-217deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request240.221.184.93.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request14.227.111.52.in-addr.arpaIN PTRResponse
-
208.95.112.1:80http://ip-api.com/line/?fields=hostinghttp9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe310 B 347 B 5 4
HTTP Request
GET http://ip-api.com/line/?fields=hostingHTTP Response
200 -
185.196.9.150:587mail.apexrnun.comsmtp-submission9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe2.7kB 5.4kB 20 23
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
97.17.167.52.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
81.144.22.2.in-addr.arpa
-
56 B 72 B 1 1
DNS Request
ip-api.com
DNS Response
208.95.112.1
-
72 B 158 B 1 1
DNS Request
75.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 95 B 1 1
DNS Request
1.112.95.208.in-addr.arpa
-
8.8.8.8:53mail.apexrnun.comdns9a9b3cf1980533ad02913deca0cb3c9a16a26f6a73e320bb707150a3db4c2b68.exe63 B 79 B 1 1
DNS Request
mail.apexrnun.com
DNS Response
185.196.9.150
-
72 B 149 B 1 1
DNS Request
150.9.196.185.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
104.219.191.52.in-addr.arpa
-
73 B 147 B 1 1
DNS Request
196.249.167.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
198.187.3.20.in-addr.arpa
-
73 B 139 B 1 1
DNS Request
217.135.221.88.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
240.221.184.93.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
14.227.111.52.in-addr.arpa