Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

29/12/2022, 16:15

221229-tqnx6agf9t 6

29/12/2022, 16:01

221229-tgazyadd76 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2022, 16:01

General

  • Target

    6a46b47c7f4899a35078efa1d1e1dbf946f832cec0b9838d9899b3ef53335027.exe

  • Size

    542KB

  • MD5

    dfd7769ca24e896910aa19936993b79d

  • SHA1

    79aab4f713ce6dbe6e0ea7bfc0f03580fe8be7ed

  • SHA256

    6a46b47c7f4899a35078efa1d1e1dbf946f832cec0b9838d9899b3ef53335027

  • SHA512

    1b17b0d99520863f20b5b7d195984c14d639ff2e22771709a193ed82dad4af85821f2cd4c30bb82c69db8913c9a4b7355fb9adebf4cf941b90a69557aecc6074

  • SSDEEP

    12288:KHxsvGS/ePX+g7R0PJQLAoKy7ce9ahJsMW:WKOS/ePX+Hy7ZIQ

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

infodate.ddns.net:7777

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers.

  • Async RAT payload 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6a46b47c7f4899a35078efa1d1e1dbf946f832cec0b9838d9899b3ef53335027.exe
    "C:\Users\Admin\AppData\Local\Temp\6a46b47c7f4899a35078efa1d1e1dbf946f832cec0b9838d9899b3ef53335027.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
        PID:4864
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        2⤵
          PID:2608

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2608-135-0x0000000000400000-0x0000000000412000-memory.dmp

        Filesize

        72KB