Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
Steam Chec...ne.dll
windows7-x64
1Steam Chec...ne.dll
windows10-2004-x64
1Steam Chec...52.dll
windows7-x64
1Steam Chec...52.dll
windows10-2004-x64
1Steam Chec...me.dll
windows7-x64
1Steam Chec...me.dll
windows10-2004-x64
1Steam Chec...in.dll
windows7-x64
1Steam Chec...in.dll
windows10-2004-x64
1Steam Chec...gn.dll
windows7-x64
1Steam Chec...gn.dll
windows10-2004-x64
1Steam Chec...ts.dll
windows7-x64
1Steam Chec...ts.dll
windows10-2004-x64
1Steam Chec...rk.dll
windows7-x64
1Steam Chec...rk.dll
windows10-2004-x64
1Steam Chec....0.dll
windows7-x64
1Steam Chec....0.dll
windows10-2004-x64
1Steam Chec...on.dll
windows7-x64
1Steam Chec...on.dll
windows10-2004-x64
1Steam Chec...on.exe
windows7-x64
10Steam Chec...on.exe
windows10-2004-x64
10Steam Chec...ne.dll
windows7-x64
1Steam Chec...ne.dll
windows10-2004-x64
1Steam Chec...en.dll
windows7-x64
1Steam Chec...en.dll
windows10-2004-x64
1Steam Chec...ig.bat
windows7-x64
10Steam Chec...ig.bat
windows10-2004-x64
10Steam Chec...C2.ps1
windows7-x64
1Steam Chec...C2.ps1
windows10-2004-x64
1Steam Chec...To.ps1
windows7-x64
1Steam Chec...To.ps1
windows10-2004-x64
1Steam Chec...rk.bat
windows7-x64
10Steam Chec...rk.bat
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-es -
resource tags
arch:x64arch:x86image:win10v2004-20221111-eslocale:es-esos:windows10-2004-x64systemwindows -
submitted
01/01/2023, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
Steam Checker By abbadon/BruteEngine.dll
Resource
win7-20221111-es
Behavioral task
behavioral2
Sample
Steam Checker By abbadon/BruteEngine.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral3
Sample
Steam Checker By abbadon/Bunifu_UI_v1.52.dll
Resource
win7-20221111-es
Behavioral task
behavioral4
Sample
Steam Checker By abbadon/Bunifu_UI_v1.52.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral5
Sample
Steam Checker By abbadon/Login Theme.dll
Resource
win7-20221111-es
Behavioral task
behavioral6
Sample
Steam Checker By abbadon/Login Theme.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral7
Sample
Steam Checker By abbadon/MaterialSkin.dll
Resource
win7-20221111-es
Behavioral task
behavioral8
Sample
Steam Checker By abbadon/MaterialSkin.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral9
Sample
Steam Checker By abbadon/MetroFramework.Design.dll
Resource
win7-20220901-es
Behavioral task
behavioral10
Sample
Steam Checker By abbadon/MetroFramework.Design.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral11
Sample
Steam Checker By abbadon/MetroFramework.Fonts.dll
Resource
win7-20221111-es
Behavioral task
behavioral12
Sample
Steam Checker By abbadon/MetroFramework.Fonts.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral13
Sample
Steam Checker By abbadon/MetroFramework.dll
Resource
win7-20220812-es
Behavioral task
behavioral14
Sample
Steam Checker By abbadon/MetroFramework.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral15
Sample
Steam Checker By abbadon/MetroSuite 2.0.dll
Resource
win7-20221111-es
Behavioral task
behavioral16
Sample
Steam Checker By abbadon/MetroSuite 2.0.dll
Resource
win10v2004-20221111-es
Behavioral task
behavioral17
Sample
Steam Checker By abbadon/Newtonsoft.Json.dll
Resource
win7-20220901-es
Behavioral task
behavioral18
Sample
Steam Checker By abbadon/Newtonsoft.Json.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral19
Sample
Steam Checker By abbadon/Steam Checker V0.1 By Abbadon.exe
Resource
win7-20221111-es
Behavioral task
behavioral20
Sample
Steam Checker By abbadon/Steam Checker V0.1 By Abbadon.exe
Resource
win10v2004-20220812-es
Behavioral task
behavioral21
Sample
Steam Checker By abbadon/SuperEngine.dll
Resource
win7-20221111-es
Behavioral task
behavioral22
Sample
Steam Checker By abbadon/SuperEngine.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral23
Sample
Steam Checker By abbadon/Teen.dll
Resource
win7-20220901-es
Behavioral task
behavioral24
Sample
Steam Checker By abbadon/Teen.dll
Resource
win10v2004-20220812-es
Behavioral task
behavioral25
Sample
Steam Checker By abbadon/config/Config.bat
Resource
win7-20221111-es
Behavioral task
behavioral26
Sample
Steam Checker By abbadon/config/Config.bat
Resource
win10v2004-20221111-es
Behavioral task
behavioral27
Sample
Steam Checker By abbadon/config/System/C2.ps1
Resource
win7-20220812-es
Behavioral task
behavioral28
Sample
Steam Checker By abbadon/config/System/C2.ps1
Resource
win10v2004-20221111-es
Behavioral task
behavioral29
Sample
Steam Checker By abbadon/config/System/CopyTo.ps1
Resource
win7-20220812-es
Behavioral task
behavioral30
Sample
Steam Checker By abbadon/config/System/CopyTo.ps1
Resource
win10v2004-20221111-es
Behavioral task
behavioral31
Sample
Steam Checker By abbadon/config/System/FrameWork.bat
Resource
win7-20220812-es
General
-
Target
Steam Checker By abbadon/config/System/FrameWork.bat
-
Size
520B
-
MD5
e2bbc4167314dc0fc9acba48f2c94b74
-
SHA1
a6b4a5502f2078353769d9bd22ce632ff9035067
-
SHA256
20cf5b36516ca5251a79e6dcd08f6f8e6f3696ef24959829bc5a387950b7d178
-
SHA512
4cc2946ce8ce192b3e7bf1ea51a3305e7656c229ca1c5795c4f3762df0005d7b3db2a4e676c8b9ecbf9d770b6c379a9c15a9f3fa994ca829faea30dd64fece9d
Malware Config
Extracted
asyncrat
1.0.7
C
185.81.157.169:2023
7G6ZCBCA-NJ11-YS93-65bg-CX918E7238D5
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral32/memory/2664-158-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Executes dropped EXE 3 IoCs
pid Process 1248 MicrosoftEdgeUpdates.exe 3636 SystemUpdates.exe 2520 SystemUpdates.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3636 set thread context of 2664 3636 SystemUpdates.exe 99 PID 2520 set thread context of 2576 2520 SystemUpdates.exe 101 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4440 schtasks.exe 4452 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1248 MicrosoftEdgeUpdates.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 656 powershell.exe 656 powershell.exe 5108 powershell.exe 5108 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 656 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 992 wrote to memory of 4440 992 cmd.exe 82 PID 992 wrote to memory of 4440 992 cmd.exe 82 PID 992 wrote to memory of 4452 992 cmd.exe 83 PID 992 wrote to memory of 4452 992 cmd.exe 83 PID 992 wrote to memory of 3360 992 cmd.exe 84 PID 992 wrote to memory of 3360 992 cmd.exe 84 PID 992 wrote to memory of 4188 992 cmd.exe 85 PID 992 wrote to memory of 4188 992 cmd.exe 85 PID 992 wrote to memory of 656 992 cmd.exe 86 PID 992 wrote to memory of 656 992 cmd.exe 86 PID 992 wrote to memory of 5108 992 cmd.exe 87 PID 992 wrote to memory of 5108 992 cmd.exe 87 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 3636 wrote to memory of 2664 3636 SystemUpdates.exe 99 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 PID 2520 wrote to memory of 2576 2520 SystemUpdates.exe 101 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 3360 attrib.exe 4188 attrib.exe
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Steam Checker By abbadon\config\System\FrameWork.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Microsoft\MicrosoftEdgeUpdates\EdgeUpdate" /tr "C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdates\MicrosoftEdgeUpdates.exe" /RL HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4440
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Microsoft\SystemUpdates\SysUpdate" /tr "C:\Users\Admin\AppData\Roaming\SystemUpdates\SystemUpdates.exe" /RL HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4452
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdates2⤵
- Views/modifies file attributes
PID:3360
-
-
C:\Windows\system32\attrib.exeattrib +h +s C:\Users\Admin\AppData\Roaming\SystemUpdates2⤵
- Views/modifies file attributes
PID:4188
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy RemoteSigned -File CopyTo.PS12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden -ExecutionPolicy RemoteSigned -File C2.PS12⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdates\MicrosoftEdgeUpdates.exeC:\Users\Admin\AppData\Roaming\MicrosoftEdgeUpdates\MicrosoftEdgeUpdates.exe1⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
PID:1248
-
C:\Users\Admin\AppData\Roaming\SystemUpdates\SystemUpdates.exeC:\Users\Admin\AppData\Roaming\SystemUpdates\SystemUpdates.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2664
-
-
C:\Users\Admin\AppData\Roaming\SystemUpdates\SystemUpdates.exeC:\Users\Admin\AppData\Roaming\SystemUpdates\SystemUpdates.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"2⤵PID:2576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
1KB
MD5bfff6869253ff041b2b0be465df8bad1
SHA1d87fbcb54700714919232c4236fa4bb6df589797
SHA256889e9627d5df84d62c212051b683081e2852a5f6f8de17bf046ccf91b8b2d84d
SHA512f4bb23a3805b65b825f1a1a954b807fed0c5f8b9f830e045efb3fe86200bccb52a4c41fe954ddf3c653afd5a31c1ead2785e67d39799e0bcad2a52a94b895a29
-
Filesize
944B
MD52ad33642f863ae14ee53bc6853ee330e
SHA1ca81cc7d8c33a46ebe97bc1d3db55e41a813029e
SHA25617c7b3c895766071a0d87318ec4134a9032ed113b46d3ba75889819a61a9cc19
SHA51252c59a7bde3751e07da53f3942c15cc3e19a4bf1929fbc28ae568ed96531852747b4f724e01438e159c4c98bf2d846db205c48e32f4b5984e9fddeb936eb8aa9
-
Filesize
15KB
MD5492bd942c673806c4dc7d076d44a06de
SHA1ace44cc6d1f875aa1b58c2c0c51901f9c11b0221
SHA25630e04b25281b27e83652be61a8a61821730e30be65a95452c3b93a7a17333f00
SHA5128a328d28055337629823795dcc96adf1fce2dba6079ec29472b81f8b89917d6b312efc0ec566732effcbfa95ddf96848dead444900096ed71da590dd3861477f
-
Filesize
15KB
MD5492bd942c673806c4dc7d076d44a06de
SHA1ace44cc6d1f875aa1b58c2c0c51901f9c11b0221
SHA25630e04b25281b27e83652be61a8a61821730e30be65a95452c3b93a7a17333f00
SHA5128a328d28055337629823795dcc96adf1fce2dba6079ec29472b81f8b89917d6b312efc0ec566732effcbfa95ddf96848dead444900096ed71da590dd3861477f
-
Filesize
242KB
MD5640d55589c839016931890b47305d638
SHA1bf5062f9c16a3966abe3e7dbb083f539f1b38126
SHA2566dba74aedcdd6b0f36d2b7ea79b9c9f40fe669ac41ec0560bc67d4039279f689
SHA512da1142c340124a682f88790d06434c42e9df0ce9ebbe21920235db9de76800728f47a96aa489bf6673b426d16172664dcb4af1e1c134623d0a6eebe20fb7baaa
-
Filesize
242KB
MD5640d55589c839016931890b47305d638
SHA1bf5062f9c16a3966abe3e7dbb083f539f1b38126
SHA2566dba74aedcdd6b0f36d2b7ea79b9c9f40fe669ac41ec0560bc67d4039279f689
SHA512da1142c340124a682f88790d06434c42e9df0ce9ebbe21920235db9de76800728f47a96aa489bf6673b426d16172664dcb4af1e1c134623d0a6eebe20fb7baaa
-
Filesize
242KB
MD5640d55589c839016931890b47305d638
SHA1bf5062f9c16a3966abe3e7dbb083f539f1b38126
SHA2566dba74aedcdd6b0f36d2b7ea79b9c9f40fe669ac41ec0560bc67d4039279f689
SHA512da1142c340124a682f88790d06434c42e9df0ce9ebbe21920235db9de76800728f47a96aa489bf6673b426d16172664dcb4af1e1c134623d0a6eebe20fb7baaa