Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

General

  • Target

    e7b3793e45a0ba07901cf4aaae9881fc_JaffaCakes118

  • Size

    771KB

  • Sample

    240917-zxaxrsvcjh

  • MD5

    e7b3793e45a0ba07901cf4aaae9881fc

  • SHA1

    b21bd5b3d58501ff19dbca1373caac728a426e53

  • SHA256

    ff9b8ba13490fdd4310b5d623082f3715a8a6fea340bf1c91ba002f617d62f0e

  • SHA512

    891e37eb3630181608747fdfe5f95ddbaed5688c97f1c75c06e9f563003ac039ed1d8ecf81c66fc63c0e50ac69b106a154792463367291878dd793fbea85658f

  • SSDEEP

    12288:ssj5LNIj+RzBk9P2TO66eoNu2pKXyMBMJUClr/sZa6SviyqvivlLP1gjvltwj8ll:ssdJBzBgPgO35AxXyMBvClr/2pz

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.elcomonline.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    Elcom@302

Targets

    • Target

      e7b3793e45a0ba07901cf4aaae9881fc_JaffaCakes118

    • Size

      771KB

    • MD5

      e7b3793e45a0ba07901cf4aaae9881fc

    • SHA1

      b21bd5b3d58501ff19dbca1373caac728a426e53

    • SHA256

      ff9b8ba13490fdd4310b5d623082f3715a8a6fea340bf1c91ba002f617d62f0e

    • SHA512

      891e37eb3630181608747fdfe5f95ddbaed5688c97f1c75c06e9f563003ac039ed1d8ecf81c66fc63c0e50ac69b106a154792463367291878dd793fbea85658f

    • SSDEEP

      12288:ssj5LNIj+RzBk9P2TO66eoNu2pKXyMBMJUClr/sZa6SviyqvivlLP1gjvltwj8ll:ssdJBzBgPgO35AxXyMBvClr/2pz

    • AgentTesla

      Agent Tesla is a remote access tool (RAT) written in visual basic.

    • Modifies Windows Defender Real-time Protection settings

    • AgentTesla payload

    • Looks for VirtualBox Guest Additions in registry

    • Looks for VMWare Tools registry key

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Windows security modification

    • Adds Run key to start application

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks