Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 18:07
Behavioral task
behavioral1
Sample
F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe
Resource
win7-20220812-en
General
-
Target
F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe
-
Size
176KB
-
MD5
f8b8c7e30a0c98c7db0c64d4b925db75
-
SHA1
928ec1e03d21f51f34da1a7c801fdce9a36b3c36
-
SHA256
f5e715d046072f8716f662bb86a02be3f13dd984ed207562c9e8e3feb6aeab40
-
SHA512
67d7c8c62877a0d274089ef062a85e1b0622bcb6ccfc86d3bd9234973af514e211c4a3043504c597429ade35524f314efecea75a4695bf5489e282fef3cedef3
-
SSDEEP
3072:tuK0THf52BTHbvxPZYJ01yDgNlfWSZ0cXF:tuK+chHbIpgy/m
Malware Config
Extracted
asyncrat
0.5.7B
Default
zulakim.duckdns.org:6606
zulakim.duckdns.org:7707
zulakim.duckdns.org:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
dllhost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1044-132-0x0000000000180000-0x00000000001B2000-memory.dmp asyncrat behavioral2/files/0x000b000000000729-140.dat asyncrat behavioral2/files/0x000b000000000729-141.dat asyncrat -
Executes dropped EXE 1 IoCs
pid Process 4588 dllhost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4432 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3060 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe Token: SeDebugPrivilege 4588 dllhost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1044 wrote to memory of 3080 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 89 PID 1044 wrote to memory of 3080 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 89 PID 1044 wrote to memory of 3080 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 89 PID 1044 wrote to memory of 1940 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 91 PID 1044 wrote to memory of 1940 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 91 PID 1044 wrote to memory of 1940 1044 F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe 91 PID 3080 wrote to memory of 4432 3080 cmd.exe 93 PID 3080 wrote to memory of 4432 3080 cmd.exe 93 PID 3080 wrote to memory of 4432 3080 cmd.exe 93 PID 1940 wrote to memory of 3060 1940 cmd.exe 94 PID 1940 wrote to memory of 3060 1940 cmd.exe 94 PID 1940 wrote to memory of 3060 1940 cmd.exe 94 PID 1940 wrote to memory of 4588 1940 cmd.exe 95 PID 1940 wrote to memory of 4588 1940 cmd.exe 95 PID 1940 wrote to memory of 4588 1940 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe"C:\Users\Admin\AppData\Local\Temp\F5E715D046072F8716F662BB86A02BE3F13DD984ED207.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "dllhost" /tr '"C:\Users\Admin\AppData\Roaming\dllhost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "dllhost" /tr '"C:\Users\Admin\AppData\Roaming\dllhost.exe"'3⤵
- Creates scheduled task(s)
PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA4C7.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3060
-
-
C:\Users\Admin\AppData\Roaming\dllhost.exe"C:\Users\Admin\AppData\Roaming\dllhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5ec113f4c1bb20e51b55990a373026e22
SHA1f5e504a601cefadff05a41457b1a21535bbf3cc5
SHA2568b4218b16af1d3da63c22f893504a880e73111fb7ba3453299f0e20380918ed5
SHA51217db8b747a79b292325f9598670506dd57dc10a25852874c3461af05470bc2b082bd31b941bd683e60141c795fd0a70630c503f263542c675bdd43ac1ce9bd01
-
Filesize
176KB
MD5f8b8c7e30a0c98c7db0c64d4b925db75
SHA1928ec1e03d21f51f34da1a7c801fdce9a36b3c36
SHA256f5e715d046072f8716f662bb86a02be3f13dd984ed207562c9e8e3feb6aeab40
SHA51267d7c8c62877a0d274089ef062a85e1b0622bcb6ccfc86d3bd9234973af514e211c4a3043504c597429ade35524f314efecea75a4695bf5489e282fef3cedef3
-
Filesize
176KB
MD5f8b8c7e30a0c98c7db0c64d4b925db75
SHA1928ec1e03d21f51f34da1a7c801fdce9a36b3c36
SHA256f5e715d046072f8716f662bb86a02be3f13dd984ed207562c9e8e3feb6aeab40
SHA51267d7c8c62877a0d274089ef062a85e1b0622bcb6ccfc86d3bd9234973af514e211c4a3043504c597429ade35524f314efecea75a4695bf5489e282fef3cedef3