Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
130s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
SOAJULY202107.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
SOAJULY202107.exe
Resource
win10v2004-20241007-en
General
-
Target
SOAJULY202107.exe
-
Size
1.0MB
-
MD5
82889f1b8b41a2cc68adcd8538bb4637
-
SHA1
d7a54b3b599079db1dd72b69141b1aec119a2797
-
SHA256
d9087e4e807ef2e3c826c69d1a2e3b334e482f2ae12fc94445f595a79f64a674
-
SHA512
5f4b9cd0f04df8d66c37faa4da8539de61f37a08781497f982bda8a59c8c102c55dafa0a673e3ebf701e9e87b77d1242e7e5e70f445eae56dbfc898bdf4eb00c
-
SSDEEP
12288:0nNGmyRQ0Zwp3zdJ5z5fsaav4f6Hqd1h/HWLk0I/FE+s2xE:SCy3zhdfsapyHq/h/2Yh+u
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.bsia.co.in - Port:
587 - Username:
[email protected] - Password:
21mbsia@)@!Y
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
AgentTesla payload 5 IoCs
resource yara_rule behavioral1/memory/1684-29-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1684-32-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1684-30-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1684-26-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla behavioral1/memory/1684-24-0x0000000000400000-0x000000000043C000-memory.dmp family_agenttesla -
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions SOAJULY202107.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2832 powershell.exe 2896 powershell.exe 2200 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools SOAJULY202107.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SOAJULY202107.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SOAJULY202107.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOAJULY202107.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOAJULY202107.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOAJULY202107.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum SOAJULY202107.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 SOAJULY202107.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 1684 2556 SOAJULY202107.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SOAJULY202107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SOAJULY202107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2896 powershell.exe 2832 powershell.exe 1684 SOAJULY202107.exe 1684 SOAJULY202107.exe 2200 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2896 powershell.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 1684 SOAJULY202107.exe Token: SeDebugPrivilege 2200 powershell.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2832 2556 SOAJULY202107.exe 31 PID 2556 wrote to memory of 2832 2556 SOAJULY202107.exe 31 PID 2556 wrote to memory of 2832 2556 SOAJULY202107.exe 31 PID 2556 wrote to memory of 2832 2556 SOAJULY202107.exe 31 PID 2556 wrote to memory of 2896 2556 SOAJULY202107.exe 34 PID 2556 wrote to memory of 2896 2556 SOAJULY202107.exe 34 PID 2556 wrote to memory of 2896 2556 SOAJULY202107.exe 34 PID 2556 wrote to memory of 2896 2556 SOAJULY202107.exe 34 PID 2556 wrote to memory of 2796 2556 SOAJULY202107.exe 36 PID 2556 wrote to memory of 2796 2556 SOAJULY202107.exe 36 PID 2556 wrote to memory of 2796 2556 SOAJULY202107.exe 36 PID 2556 wrote to memory of 2796 2556 SOAJULY202107.exe 36 PID 2556 wrote to memory of 2200 2556 SOAJULY202107.exe 38 PID 2556 wrote to memory of 2200 2556 SOAJULY202107.exe 38 PID 2556 wrote to memory of 2200 2556 SOAJULY202107.exe 38 PID 2556 wrote to memory of 2200 2556 SOAJULY202107.exe 38 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 PID 2556 wrote to memory of 1684 2556 SOAJULY202107.exe 40 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOAJULY202107.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 SOAJULY202107.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SOAJULY202107.exe"C:\Users\Admin\AppData\Local\Temp\SOAJULY202107.exe"1⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\SOAJULY202107.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YxSVQeX.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YxSVQeX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp34F5.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YxSVQeX.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2200
-
-
C:\Users\Admin\AppData\Local\Temp\SOAJULY202107.exe"C:\Users\Admin\AppData\Local\Temp\SOAJULY202107.exe"2⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:1684
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ed2b745db5978404f439b003daaf6b27
SHA172a5f1a8f0c9728cd1999816748cbbad531e68bc
SHA2562d0c534a78feb8772a5293bc1a448c1ac9c86ca2c7d57c2f00db72fa252a9c3d
SHA5123764ba2568a7516dde27921705038daac67d0c78f0c3bdc7aa51792deb6cbc845c949be99b64631abf0abee3c0c5974c2c1ab40245277cfca34b2942e4c9ecb5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PZY450SKB1WTFOTCDJ3E.temp
Filesize7KB
MD5f6b7063e21f5ccc539f42d5be56068cd
SHA18249ba906ffc0bd1cfa10068fe04ee4a210d7e69
SHA256b0468844a577c908ff937252865f55aa194dbb323eb7b1bc8497467293de48c3
SHA51267f316906400508baa29700e281829367876185177346c9b064bfdf743d4c564cc8852d92e655e5f09f006a0ed8a6b33817f8ab89f7976a4006e3b34ef8c82cd