Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2023, 01:13
Behavioral task
behavioral1
Sample
0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe
Resource
win7-20230220-en
General
-
Target
0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe
-
Size
45KB
-
MD5
3b7f9dcb3b83acf40f32d5f7c500fefb
-
SHA1
08195d91e8e187c4edfb03e3fa6784524481802a
-
SHA256
0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777
-
SHA512
daa05b7159d649dcb9e7c07c010b777daee79df18c0fb0d60364e942282dc1f1d63b9c0b1929f8217000e63c3526b7464133c08e42e21be392337e4c3724fad1
-
SSDEEP
768:vuK49TH4EjZWUR+ejmo2qrL/ot3APIPzjbogX3a7bsaN3KnVABDZXx:vuK49THf520s3lP3b/XKUaN3CWdXx
Malware Config
Extracted
asyncrat
0.5.7B
Christ2
dlusercontent.net:4444
3048tui grwj0grw08
-
delay
3
-
install
true
-
install_file
windllx.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1420-133-0x00000000004E0000-0x00000000004F2000-memory.dmp asyncrat behavioral2/files/0x000200000002186c-142.dat asyncrat behavioral2/files/0x000200000002186c-143.dat asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe -
Executes dropped EXE 1 IoCs
pid Process 1004 windllx.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3756 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3988 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe Token: SeDebugPrivilege 1004 windllx.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1420 wrote to memory of 4688 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 86 PID 1420 wrote to memory of 4688 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 86 PID 1420 wrote to memory of 4688 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 86 PID 1420 wrote to memory of 1192 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 88 PID 1420 wrote to memory of 1192 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 88 PID 1420 wrote to memory of 1192 1420 0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe 88 PID 1192 wrote to memory of 3988 1192 cmd.exe 90 PID 1192 wrote to memory of 3988 1192 cmd.exe 90 PID 1192 wrote to memory of 3988 1192 cmd.exe 90 PID 4688 wrote to memory of 3756 4688 cmd.exe 91 PID 4688 wrote to memory of 3756 4688 cmd.exe 91 PID 4688 wrote to memory of 3756 4688 cmd.exe 91 PID 1192 wrote to memory of 1004 1192 cmd.exe 92 PID 1192 wrote to memory of 1004 1192 cmd.exe 92 PID 1192 wrote to memory of 1004 1192 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe"C:\Users\Admin\AppData\Local\Temp\0c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windllx" /tr '"C:\Users\Admin\AppData\Roaming\windllx.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windllx" /tr '"C:\Users\Admin\AppData\Roaming\windllx.exe"'3⤵
- Creates scheduled task(s)
PID:3756
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp833E.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3988
-
-
C:\Users\Admin\AppData\Roaming\windllx.exe"C:\Users\Admin\AppData\Roaming\windllx.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD53ff54698b11f966790404db47b837178
SHA1e59a9df5c2a359756c29107133b6fa4d606e9247
SHA2560e67b82d1e64b83df93cbd48b1a9f76e37b7f85bae21e0b2e4151d3820e3a563
SHA512fe7b65e026d20d182eb914bda03d725752c46d4222fbddae60222869bea7b3c5426f53d9981290fa557862c44c2439daa7723913707210a19a59c1293a937c92
-
Filesize
45KB
MD53b7f9dcb3b83acf40f32d5f7c500fefb
SHA108195d91e8e187c4edfb03e3fa6784524481802a
SHA2560c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777
SHA512daa05b7159d649dcb9e7c07c010b777daee79df18c0fb0d60364e942282dc1f1d63b9c0b1929f8217000e63c3526b7464133c08e42e21be392337e4c3724fad1
-
Filesize
45KB
MD53b7f9dcb3b83acf40f32d5f7c500fefb
SHA108195d91e8e187c4edfb03e3fa6784524481802a
SHA2560c6b9d6c37b17c04112ce5b33b8b7770c483cb70b1e28f66d06d1bbf8384c777
SHA512daa05b7159d649dcb9e7c07c010b777daee79df18c0fb0d60364e942282dc1f1d63b9c0b1929f8217000e63c3526b7464133c08e42e21be392337e4c3724fad1