Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
230s -
max time network
272s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25/11/2022, 10:08
Static task
static1
Behavioral task
behavioral1
Sample
f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe
Resource
win10v2004-20221111-en
General
-
Target
f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe
-
Size
734KB
-
MD5
240a0e2f9ffa3e9e789ceb35a585ee14
-
SHA1
e5d27dd1e90b4622f97bcfd72c81217f22157b3c
-
SHA256
f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8
-
SHA512
179173f3264af7b0eb68783691313aab3867fd4b4b19c051ecac31bb9aff9f6d98970ee18022f4e614bfaba32e1816663becb2239ecff1894e3808eae2cfb0f5
-
SSDEEP
12288:5JD1+j2dKPX6Tub7lQLvvfqeo9DlzlPtST2bubBoBzLJZ7:5FTd0wub7avBulX9bCgLJZ
Malware Config
Extracted
asyncrat
0.5.7B
Default
45.145.22.142:6606
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 6 IoCs
resource yara_rule behavioral1/memory/1636-74-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1636-75-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1636-77-0x000000000040C70E-mapping.dmp asyncrat behavioral1/memory/1636-76-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1636-80-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/1636-82-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
pid Process 1240 WindowsUpdate.exe 1636 InstallUtil.exe -
Loads dropped DLL 2 IoCs
pid Process 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 1240 WindowsUpdate.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "C:\\Users\\Admin\\Desktop\\WindowsUpdate.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1240 set thread context of 1636 1240 WindowsUpdate.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 1240 WindowsUpdate.exe 1240 WindowsUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe Token: SeDebugPrivilege 1240 WindowsUpdate.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1068 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 28 PID 1212 wrote to memory of 1068 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 28 PID 1212 wrote to memory of 1068 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 28 PID 1212 wrote to memory of 1068 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 28 PID 1068 wrote to memory of 924 1068 cmd.exe 30 PID 1068 wrote to memory of 924 1068 cmd.exe 30 PID 1068 wrote to memory of 924 1068 cmd.exe 30 PID 1068 wrote to memory of 924 1068 cmd.exe 30 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1212 wrote to memory of 1240 1212 f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe 32 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33 PID 1240 wrote to memory of 1636 1240 WindowsUpdate.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe"C:\Users\Admin\AppData\Local\Temp\f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "WindowsUpdate" /t REG_SZ /d "C:\Users\Admin\Desktop\WindowsUpdate.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "WindowsUpdate" /t REG_SZ /d "C:\Users\Admin\Desktop\WindowsUpdate.exe"3⤵
- Adds Run key to start application
PID:924
-
-
-
C:\Users\Admin\Desktop\WindowsUpdate.exe"C:\Users\Admin\Desktop\WindowsUpdate.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"C:\Users\Admin\AppData\Local\Temp\InstallUtil.exe"3⤵
- Executes dropped EXE
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
734KB
MD5240a0e2f9ffa3e9e789ceb35a585ee14
SHA1e5d27dd1e90b4622f97bcfd72c81217f22157b3c
SHA256f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8
SHA512179173f3264af7b0eb68783691313aab3867fd4b4b19c051ecac31bb9aff9f6d98970ee18022f4e614bfaba32e1816663becb2239ecff1894e3808eae2cfb0f5
-
Filesize
734KB
MD5240a0e2f9ffa3e9e789ceb35a585ee14
SHA1e5d27dd1e90b4622f97bcfd72c81217f22157b3c
SHA256f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8
SHA512179173f3264af7b0eb68783691313aab3867fd4b4b19c051ecac31bb9aff9f6d98970ee18022f4e614bfaba32e1816663becb2239ecff1894e3808eae2cfb0f5
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
734KB
MD5240a0e2f9ffa3e9e789ceb35a585ee14
SHA1e5d27dd1e90b4622f97bcfd72c81217f22157b3c
SHA256f206813414d2040a855ca9074033777f3dfd2d4f1664e60c40df1963c8c972f8
SHA512179173f3264af7b0eb68783691313aab3867fd4b4b19c051ecac31bb9aff9f6d98970ee18022f4e614bfaba32e1816663becb2239ecff1894e3808eae2cfb0f5