Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
29/05/2023, 08:18
Behavioral task
behavioral1
Sample
01206099.exe
Resource
win7-20230220-en
General
-
Target
01206099.exe
-
Size
698KB
-
MD5
acca46dd166c04133d2916b8d780e245
-
SHA1
e426111a0a29367369a81219161e7577158f0204
-
SHA256
127c167eab781efef570aaa089b6a66141953dc700beb9f5d5ba4cfa6ae4c97d
-
SHA512
e603a3c651c612edc29bfbb0e688b75e4faa8e7b96a94dbb860d404191d04f1a1ea488302aa4516f778922bb866014591963732cb42e67f608db90411f1a5004
-
SSDEEP
6144:XWoSFtKEx6Ixb26rQ7jnr83cVcg6fBuBuDuHJMJlFRQJfYyu2gHuFdfYJFuVBiLQ:XYxa/7jn7lTMZod7Y8
Malware Config
Signatures
-
Async RAT payload 5 IoCs
resource yara_rule behavioral1/memory/1336-54-0x0000000000BE0000-0x0000000000C94000-memory.dmp asyncrat behavioral1/files/0x002000000000f683-65.dat asyncrat behavioral1/files/0x002000000000f683-66.dat asyncrat behavioral1/files/0x002000000000f683-67.dat asyncrat behavioral1/memory/868-68-0x0000000000EC0000-0x0000000000F74000-memory.dmp asyncrat -
Executes dropped EXE 1 IoCs
pid Process 868 service.exe -
Loads dropped DLL 1 IoCs
pid Process 1764 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2024 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1708 timeout.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1336 01206099.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1336 01206099.exe Token: SeDebugPrivilege 868 service.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1336 wrote to memory of 768 1336 01206099.exe 28 PID 1336 wrote to memory of 768 1336 01206099.exe 28 PID 1336 wrote to memory of 768 1336 01206099.exe 28 PID 1336 wrote to memory of 768 1336 01206099.exe 28 PID 768 wrote to memory of 2024 768 cmd.exe 30 PID 768 wrote to memory of 2024 768 cmd.exe 30 PID 768 wrote to memory of 2024 768 cmd.exe 30 PID 768 wrote to memory of 2024 768 cmd.exe 30 PID 1336 wrote to memory of 1764 1336 01206099.exe 31 PID 1336 wrote to memory of 1764 1336 01206099.exe 31 PID 1336 wrote to memory of 1764 1336 01206099.exe 31 PID 1336 wrote to memory of 1764 1336 01206099.exe 31 PID 1764 wrote to memory of 1708 1764 cmd.exe 33 PID 1764 wrote to memory of 1708 1764 cmd.exe 33 PID 1764 wrote to memory of 1708 1764 cmd.exe 33 PID 1764 wrote to memory of 1708 1764 cmd.exe 33 PID 1764 wrote to memory of 868 1764 cmd.exe 34 PID 1764 wrote to memory of 868 1764 cmd.exe 34 PID 1764 wrote to memory of 868 1764 cmd.exe 34 PID 1764 wrote to memory of 868 1764 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\01206099.exe"C:\Users\Admin\AppData\Local\Temp\01206099.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "service" /tr '"C:\Users\Admin\AppData\Roaming\service.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "service" /tr '"C:\Users\Admin\AppData\Roaming\service.exe"'3⤵
- Creates scheduled task(s)
PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6C2C.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1708
-
-
C:\Users\Admin\AppData\Roaming\service.exe"C:\Users\Admin\AppData\Roaming\service.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:868
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5ec58aad5140116f780b5efbe18f766b7
SHA1dd51c2f0fcb4689e30f0bd588d0f3bb0ad302694
SHA2560e791ed84fd3e1679dd7885221852e9a1f5b8ebdd5a3ddc63d18bcc3311cb688
SHA5122f13dfa3e28072f2bfea2dae28ce09c583926918b07a1f0789ad2584f101ae8e0a52b1275dd870714768edac465c71211d946578dc55a6ce1ad81a0760c1f687
-
Filesize
151B
MD5ec58aad5140116f780b5efbe18f766b7
SHA1dd51c2f0fcb4689e30f0bd588d0f3bb0ad302694
SHA2560e791ed84fd3e1679dd7885221852e9a1f5b8ebdd5a3ddc63d18bcc3311cb688
SHA5122f13dfa3e28072f2bfea2dae28ce09c583926918b07a1f0789ad2584f101ae8e0a52b1275dd870714768edac465c71211d946578dc55a6ce1ad81a0760c1f687
-
Filesize
698KB
MD5acca46dd166c04133d2916b8d780e245
SHA1e426111a0a29367369a81219161e7577158f0204
SHA256127c167eab781efef570aaa089b6a66141953dc700beb9f5d5ba4cfa6ae4c97d
SHA512e603a3c651c612edc29bfbb0e688b75e4faa8e7b96a94dbb860d404191d04f1a1ea488302aa4516f778922bb866014591963732cb42e67f608db90411f1a5004
-
Filesize
698KB
MD5acca46dd166c04133d2916b8d780e245
SHA1e426111a0a29367369a81219161e7577158f0204
SHA256127c167eab781efef570aaa089b6a66141953dc700beb9f5d5ba4cfa6ae4c97d
SHA512e603a3c651c612edc29bfbb0e688b75e4faa8e7b96a94dbb860d404191d04f1a1ea488302aa4516f778922bb866014591963732cb42e67f608db90411f1a5004
-
Filesize
698KB
MD5acca46dd166c04133d2916b8d780e245
SHA1e426111a0a29367369a81219161e7577158f0204
SHA256127c167eab781efef570aaa089b6a66141953dc700beb9f5d5ba4cfa6ae4c97d
SHA512e603a3c651c612edc29bfbb0e688b75e4faa8e7b96a94dbb860d404191d04f1a1ea488302aa4516f778922bb866014591963732cb42e67f608db90411f1a5004