Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/12/2024, 06:00 UTC

General

  • Target

    dmm.exe

  • Size

    1.1MB

  • MD5

    bbbcc33a90a58ddb7484fbb4e3de9045

  • SHA1

    9c950cd00cf4f1f5896c16fa1df84232ab23a441

  • SHA256

    ad7e3733334f727508954b7fddebe16af8fb5499e28e243ed42286da81a2da15

  • SHA512

    d3ffddb78745741bc56b54c1da9447a89e14afc3edba7a44dd5cd852a0ca4c5a9d982e65b5dda8fab8cde941a74a7542fcacb5c2f62271472ea6976e58d8e6d6

  • SSDEEP

    24576:+qDEvCTbMWu7rQYlBQcBiT6rprG8afwa1DQESEFw:+TvC/MTQYxsWR7afwaRLSEF

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    smtp
  • Host:
    mail.pgsu.co.id
  • Port:
    587
  • Username:
    joko.wahyono@pgsu.co.id
  • Password:
    Vecls16@Vezs
  • Email To:
    bjleekd@gmail.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dmm.exe
    "C:\Users\Admin\AppData\Local\Temp\dmm.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\dmm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1692

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1692-7-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1692-11-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1692-9-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1692-12-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB

  • memory/1692-13-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/1692-14-0x00000000747EE000-0x00000000747EF000-memory.dmp

    Filesize

    4KB

  • memory/1692-15-0x00000000747E0000-0x0000000074ECE000-memory.dmp

    Filesize

    6.9MB

  • memory/2524-6-0x0000000000670000-0x0000000000A70000-memory.dmp

    Filesize

    4.0MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.