Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/09/2024, 21:31
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20240903-en
General
-
Target
New Order.exe
-
Size
1.0MB
-
MD5
da2b28ff7945825e56de25f06cdeae07
-
SHA1
6039230ca4a9844b94f894f0411d2fc2049dd3ea
-
SHA256
213d438ca097826c2ef69d2fa9210cc760825f4be66460ab90bd31452e47c79a
-
SHA512
21244ff4127b19f3f0aa873a4f2eb4dbfb9082c1e6bdfce843582aeb4a34063776d6e0ff0e3d67a7bf898f7fbac0648b7491f5e12f26aa138286e3926878c1ba
-
SSDEEP
12288:CgTgwI1Ih2uPkWPC1YbHMYVMCcZvbyROa/6DOKFHm:MwIeFTMMMvml6rFH
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.fakly-cambodia.com - Port:
587 - Username:
[email protected] - Password:
Mmhh#2014
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/2292-16-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2292-22-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2292-26-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2292-24-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/2292-18-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions New Order.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools New Order.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion New Order.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion New Order.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum New Order.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 New Order.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 540 set thread context of 2292 540 New Order.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2632 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 540 New Order.exe 2292 New Order.exe 2292 New Order.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 540 New Order.exe Token: SeDebugPrivilege 2292 New Order.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 540 wrote to memory of 2632 540 New Order.exe 32 PID 540 wrote to memory of 2632 540 New Order.exe 32 PID 540 wrote to memory of 2632 540 New Order.exe 32 PID 540 wrote to memory of 2632 540 New Order.exe 32 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34 PID 540 wrote to memory of 2292 540 New Order.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\lDHImfLkSpZk" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF5F3.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD531075601b9b4048adb65877efb2196fa
SHA15410f8e78afddfaeccc1efe31e54e6e65ee2e37f
SHA256de0ba39676721c02063bf6c804415c65950796821affd8bdef52953350915541
SHA51223b313bfa1f226f3f8d01297263c027e07fbd11692550182e3658eb9f205a9168ecd3189eb6193a52d045add685b5139ef94daa0e12fc0383f936ddf296ac7e0