Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/01/2025, 01:02
Static task
static1
Behavioral task
behavioral1
Sample
de932fd5a90b8d80a6b6223d46b905f3dc911ef96e5ffb084386f614f2d2dd8a.xlam
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de932fd5a90b8d80a6b6223d46b905f3dc911ef96e5ffb084386f614f2d2dd8a.xlam
Resource
win10v2004-20241007-en
General
-
Target
de932fd5a90b8d80a6b6223d46b905f3dc911ef96e5ffb084386f614f2d2dd8a.xlam
-
Size
732KB
-
MD5
81569ed8fd1a3ae9141e1ca9ebc6e3f1
-
SHA1
0b88ae280590d423d0970d5afcf9b7ab984d2c27
-
SHA256
de932fd5a90b8d80a6b6223d46b905f3dc911ef96e5ffb084386f614f2d2dd8a
-
SHA512
fc2071d62453967631389ffbddf6ea358d1f09d67d2259b26ef858d303ac2a0ae1094283110960abdd288744e6d24d8f037445066a44ddcd11bcc0fb24c9bbd1
-
SSDEEP
12288:OZRNsgqnTxkQlWaCMSVKptJKpeKBvMWZqyQ/F+lqCnsxcMFRCdOk:6RvqntksCCtJVKVMWk+Dsx4
Malware Config
Extracted
agenttesla
Protocol: ftp- Host:
ftp://ftp.stingatoareincendii.ro - Port:
21 - Username:
[email protected] - Password:
3.*RYhlG)lkA
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Agenttesla family
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 1948 EQNEDT32.EXE -
Downloads MZ/PE file 1 IoCs
flow pid Process 5 1948 EQNEDT32.EXE -
Executes dropped EXE 1 IoCs
pid Process 2876 exhwisjk.exe -
Loads dropped DLL 1 IoCs
pid Process 1948 EQNEDT32.EXE -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2876-28-0x0000000000340000-0x000000000047F000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2876 set thread context of 2816 2876 exhwisjk.exe 34 -
resource yara_rule behavioral1/files/0x00070000000173a3-7.dat upx behavioral1/memory/2876-11-0x0000000000340000-0x000000000047F000-memory.dmp upx behavioral1/memory/1948-9-0x0000000006890000-0x00000000069CF000-memory.dmp upx behavioral1/memory/2876-28-0x0000000000340000-0x000000000047F000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EQNEDT32.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language exhwisjk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 1948 EQNEDT32.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2076 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2816 RegSvcs.exe 2816 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2876 exhwisjk.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2816 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2876 exhwisjk.exe 2876 exhwisjk.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2876 exhwisjk.exe 2876 exhwisjk.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2076 EXCEL.EXE 2076 EXCEL.EXE 2076 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2876 1948 EQNEDT32.EXE 33 PID 1948 wrote to memory of 2876 1948 EQNEDT32.EXE 33 PID 1948 wrote to memory of 2876 1948 EQNEDT32.EXE 33 PID 1948 wrote to memory of 2876 1948 EQNEDT32.EXE 33 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34 PID 2876 wrote to memory of 2816 2876 exhwisjk.exe 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\de932fd5a90b8d80a6b6223d46b905f3dc911ef96e5ffb084386f614f2d2dd8a.xlam1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2076
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\exhwisjk.exeC:\Users\Admin\AppData\Local\Temp\exhwisjk.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeC:\Users\Admin\AppData\Local\Temp\exhwisjk.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5ad8751d43980aa9ea13975c9d7262a4d
SHA121f2bdedea7b043db2db96b7889eca6bafd99f51
SHA2567ee3a9afbaff41655fc0c37db9365aa25b3547ca1e728d02779c6214f8a67868
SHA51292be92e7f7b783a88a6eab6714dec4991f18aabec8eaf97391de61e98718399a985b63891d6d3623661a1e7194d98e9cc8f2114481d8305fd79d58a9582acb9c