Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/01/2025, 11:33 UTC

General

  • Target

    Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe

  • Size

    2.5MB

  • MD5

    70de418c59709a8703cb46deee36bde6

  • SHA1

    69ca92a03fc7d986f686c0acafc51dcf515c2f7c

  • SHA256

    9da74e41306059077f155debea5f44a5969e79297c9de44a4e355e4bb68b0536

  • SHA512

    cbeedd7aa302b1db4de7608f8f0c35aec37c38421979b6ae43eb759e13129b1e5343e343ebe0910cb8290fb91200a91fd7796a61aaac9e09c271dbdc352ca315

  • SSDEEP

    49152:1bdYAm4zEbdYAm4zXbdYAm4zKbdYAm4zFbdYAm4zB3An3AI3AJ3AlO3mMM7aApu6:FdrWdrrdrAdr1drlA3AaAtAgu7au

Malware Config

Extracted

Family

agenttesla

Credentials

  • Protocol:
    ftp
  • Host:
    ftp://ftp.controlfire.com.mx
  • Port:
    21
  • Username:
    usufffaz@controlfire.com.mx
  • Password:
    0a4XlE=4t8mz

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Agenttesla family
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe
    "C:\Users\Admin\AppData\Local\Temp\Comprobante_swift_9767864574756346523cc43546576ds8977564534253465789.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5036
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4396

Network

  • flag-us
    DNS
    133.211.185.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    133.211.185.52.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    74.32.126.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    74.32.126.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    5.114.82.104.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    5.114.82.104.in-addr.arpa
    IN PTR
    Response
    5.114.82.104.in-addr.arpa
    IN PTR
    a104-82-114-5deploystaticakamaitechnologiescom
  • flag-us
    DNS
    ip-api.com
    regasm.exe
    Remote address:
    8.8.8.8:53
    Request
    ip-api.com
    IN A
    Response
    ip-api.com
    IN A
    208.95.112.1
  • flag-us
    GET
    http://ip-api.com/line/?fields=hosting
    regasm.exe
    Remote address:
    208.95.112.1:80
    Request
    GET /line/?fields=hosting HTTP/1.1
    Host: ip-api.com
    Connection: Keep-Alive
    Response
    HTTP/1.1 200 OK
    Date: Tue, 28 Jan 2025 11:33:24 GMT
    Content-Type: text/plain; charset=utf-8
    Content-Length: 6
    Access-Control-Allow-Origin: *
    X-Ttl: 49
    X-Rl: 43
  • flag-us
    DNS
    1.112.95.208.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    1.112.95.208.in-addr.arpa
    IN PTR
    Response
    1.112.95.208.in-addr.arpa
    IN PTR
    ip-apicom
  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    50.23.12.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    50.23.12.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    198.187.3.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    198.187.3.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    65.139.73.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    65.139.73.23.in-addr.arpa
    IN PTR
    Response
    65.139.73.23.in-addr.arpa
    IN PTR
    a23-73-139-65deploystaticakamaitechnologiescom
  • flag-us
    DNS
    96.136.73.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    96.136.73.23.in-addr.arpa
    IN PTR
    Response
    96.136.73.23.in-addr.arpa
    IN PTR
    a23-73-136-96deploystaticakamaitechnologiescom
  • flag-us
    DNS
    138.136.73.23.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    138.136.73.23.in-addr.arpa
    IN PTR
    Response
    138.136.73.23.in-addr.arpa
    IN PTR
    a23-73-136-138deploystaticakamaitechnologiescom
  • flag-us
    DNS
    22.236.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    22.236.111.52.in-addr.arpa
    IN PTR
    Response
  • 208.95.112.1:80
    http://ip-api.com/line/?fields=hosting
    http
    regasm.exe
    362 B
    562 B
    6
    5

    HTTP Request

    GET http://ip-api.com/line/?fields=hosting

    HTTP Response

    200
  • 8.8.8.8:53
    133.211.185.52.in-addr.arpa
    dns
    73 B
    147 B
    1
    1

    DNS Request

    133.211.185.52.in-addr.arpa

  • 8.8.8.8:53
    74.32.126.40.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    74.32.126.40.in-addr.arpa

  • 8.8.8.8:53
    5.114.82.104.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    5.114.82.104.in-addr.arpa

  • 8.8.8.8:53
    ip-api.com
    dns
    regasm.exe
    56 B
    72 B
    1
    1

    DNS Request

    ip-api.com

    DNS Response

    208.95.112.1

  • 8.8.8.8:53
    1.112.95.208.in-addr.arpa
    dns
    71 B
    95 B
    1
    1

    DNS Request

    1.112.95.208.in-addr.arpa

  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    50.23.12.20.in-addr.arpa
    dns
    70 B
    156 B
    1
    1

    DNS Request

    50.23.12.20.in-addr.arpa

  • 8.8.8.8:53
    198.187.3.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    198.187.3.20.in-addr.arpa

  • 8.8.8.8:53
    65.139.73.23.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    65.139.73.23.in-addr.arpa

  • 8.8.8.8:53
    96.136.73.23.in-addr.arpa
    dns
    71 B
    135 B
    1
    1

    DNS Request

    96.136.73.23.in-addr.arpa

  • 8.8.8.8:53
    138.136.73.23.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    138.136.73.23.in-addr.arpa

  • 8.8.8.8:53
    22.236.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    22.236.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4396-37-0x0000000074370000-0x0000000074B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4396-31-0x00000000012D0000-0x00000000012D1000-memory.dmp

    Filesize

    4KB

  • memory/4396-42-0x0000000074370000-0x0000000074B20000-memory.dmp

    Filesize

    7.7MB

  • memory/4396-41-0x000000007437E000-0x000000007437F000-memory.dmp

    Filesize

    4KB

  • memory/4396-40-0x0000000006C60000-0x0000000006C6A000-memory.dmp

    Filesize

    40KB

  • memory/4396-39-0x0000000006CD0000-0x0000000006D62000-memory.dmp

    Filesize

    584KB

  • memory/4396-32-0x000000007437E000-0x000000007437F000-memory.dmp

    Filesize

    4KB

  • memory/4396-38-0x0000000006BE0000-0x0000000006C30000-memory.dmp

    Filesize

    320KB

  • memory/4396-36-0x0000000005900000-0x0000000005966000-memory.dmp

    Filesize

    408KB

  • memory/4396-28-0x0000000000400000-0x0000000000447000-memory.dmp

    Filesize

    284KB

  • memory/4396-34-0x0000000005EB0000-0x0000000006454000-memory.dmp

    Filesize

    5.6MB

  • memory/4396-33-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/4396-30-0x00000000774D2000-0x00000000774D3000-memory.dmp

    Filesize

    4KB

  • memory/5036-35-0x000000006F8E0000-0x000000006FB57000-memory.dmp

    Filesize

    2.5MB

  • memory/5036-9-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/5036-3-0x00000000021E0000-0x00000000021E1000-memory.dmp

    Filesize

    4KB

  • memory/5036-27-0x000000006F8E0000-0x000000006FB57000-memory.dmp

    Filesize

    2.5MB

  • memory/5036-23-0x000000006F8E0000-0x000000006FB57000-memory.dmp

    Filesize

    2.5MB

  • memory/5036-2-0x00000000774D2000-0x00000000774D3000-memory.dmp

    Filesize

    4KB

  • memory/5036-8-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/5036-10-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

  • memory/5036-12-0x000000006F8E9000-0x000000006F8EA000-memory.dmp

    Filesize

    4KB

  • memory/5036-13-0x000000006F8E0000-0x000000006FB57000-memory.dmp

    Filesize

    2.5MB

  • memory/5036-11-0x00000000006E0000-0x00000000007E0000-memory.dmp

    Filesize

    1024KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.