Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
151s -
max time network
146s -
platform
windows7_x64 -
resource
win7v200217 -
submitted
11/03/2020, 12:35
Static task
static1
Behavioral task
behavioral1
Sample
AA_v3.5.exe
Resource
win7v200217
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
AA_v3.5.exe
Resource
win10v200217
0 signatures
0 seconds
General
-
Target
AA_v3.5.exe
-
Size
746KB
-
MD5
2cbf5657ffd8858a9597f296a60270c2
-
SHA1
b130611c92788337c4f6bb9e9454ff06eb409166
-
SHA256
9b3f4d6a9bae4d7f9cfe45e706db8fe4baef51ae12353941e8b1532b231e6eac
-
SHA512
06339a299c8c9ce55e9b96582e54e0bf9e04f894ceb47c07486adf8b0140c2a01fd0932207aca8112ee0b16ba8711fee9435e37339aafb94f167b5a736ee7d0b
Score
10/10
Malware Config
Signatures
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1880 AA_v3.5.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1880 AA_v3.5.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE AA_v3.5.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy AA_v3.5.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr = 537d567366097c6f5e5a4117515397ce57c8e1a8bd6b AA_v3.5.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin\hr3 = 4dad5a17386b5846020b48a00cb72ac332001d212a16dfea970e0b9ecf6194bb1b0d455b811d8292b607ebe2d73218ea9129cfdcaa2b6859e4a495b221349951 AA_v3.5.exe -
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1880 1860 AA_v3.5.exe 25 PID 1860 wrote to memory of 1880 1860 AA_v3.5.exe 25 PID 1860 wrote to memory of 1880 1860 AA_v3.5.exe 25 PID 1860 wrote to memory of 1880 1860 AA_v3.5.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"1⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe" -service -lunch1⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"C:\Users\Admin\AppData\Local\Temp\AA_v3.5.exe"2⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Modifies data under HKEY_USERS
PID:1880
-