Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13/12/2024, 10:19
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Advice 21545 Final documents.exe
Resource
win7-20240708-en
General
-
Target
Shipping Advice 21545 Final documents.exe
-
Size
612KB
-
MD5
bf2eaf378c5276789cb7c4609c0794ec
-
SHA1
989aec2d97749196cce249acb808350a56ca589e
-
SHA256
48e0fd5d27b2b0bab57f371c72cbadb81e5df3af8a891fe5defde7193055942b
-
SHA512
7621ab0b046819be21d5fd2d69fb38a47fd15761937fad65f8d53a9127ec5a0f0eb2e300448d2a1e05c92a03d2998e56a4524e198a4775c4dfec0e900f235635
-
SSDEEP
12288:QCD0bOY6MLUcNFhyB6MDw438vOCxqDKbXCll9/95+PAY5DFxKV:QZU49jhypDHe8QCl55+PAU3e
Malware Config
Extracted
Protocol: smtp- Host:
mail.alltoursegypt.com - Port:
587 - Username:
[email protected] - Password:
OPldome23#12klein
Extracted
agenttesla
Protocol: smtp- Host:
mail.alltoursegypt.com - Port:
587 - Username:
[email protected] - Password:
OPldome23#12klein - Email To:
[email protected]
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Shipping Advice 21545 Final documents.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Shipping Advice 21545 Final documents.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Shipping Advice 21545 Final documents.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Shipping Advice 21545 Final documents.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api.ipify.org 5 api.ipify.org -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Shipping Advice 21545 Final documents.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Shipping Advice 21545 Final documents.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2552 set thread context of 328 2552 Shipping Advice 21545 Final documents.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language installutil.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2552 Shipping Advice 21545 Final documents.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 328 installutil.exe 328 installutil.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 328 installutil.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 328 installutil.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 328 2552 Shipping Advice 21545 Final documents.exe 32 PID 2552 wrote to memory of 2692 2552 Shipping Advice 21545 Final documents.exe 33 PID 2552 wrote to memory of 2692 2552 Shipping Advice 21545 Final documents.exe 33 PID 2552 wrote to memory of 2692 2552 Shipping Advice 21545 Final documents.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Shipping Advice 21545 Final documents.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Advice 21545 Final documents.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\installutil.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:328
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2552 -s 7602⤵PID:2692
-