Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
806s -
max time network
810s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
27/08/2023, 06:02
Behavioral task
behavioral1
Sample
AstralAimbot_4.2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AstralAimbot_4.2.exe
Resource
win10-20230703-en
General
-
Target
AstralAimbot_4.2.exe
-
Size
3.1MB
-
MD5
d3b8122fe1ab8628492ba209d6da8c9d
-
SHA1
f19ba62ca57f4325e15a235dc0b74fa14b5624b2
-
SHA256
657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
-
SHA512
ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a
-
SSDEEP
49152:Cvht62XlaSFNWPjljiFa2RoUYIQi/bdpqUoGdZizoTHHB72eh2NT:CvL62XlaSFNWPjljiFXRoUYIF/b8
Malware Config
Extracted
quasar
1.4.1
asdasd
6.tcp.ngrok.io:18160
a05bb804-7a29-47fc-917b-02ee2cb4b1a2
-
encryption_key
02C7E31FB83C81538B3B7AEA158F1FCCDC2B0FEA
-
install_name
asdsdasd.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SystEm32
-
subdirectory
dasdasd
Signatures
-
Quasar payload 4 IoCs
resource yara_rule behavioral1/memory/1700-0-0x0000000001240000-0x0000000001564000-memory.dmp family_quasar behavioral1/files/0x0006000000012110-6.dat family_quasar behavioral1/files/0x0006000000012110-7.dat family_quasar behavioral1/memory/456-9-0x00000000000E0000-0x0000000000404000-memory.dmp family_quasar -
Executes dropped EXE 1 IoCs
pid Process 456 asdsdasd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2324 schtasks.exe 2420 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1700 AstralAimbot_4.2.exe Token: SeDebugPrivilege 456 asdsdasd.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 456 asdsdasd.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 456 asdsdasd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 456 asdsdasd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2324 1700 AstralAimbot_4.2.exe 29 PID 1700 wrote to memory of 2324 1700 AstralAimbot_4.2.exe 29 PID 1700 wrote to memory of 2324 1700 AstralAimbot_4.2.exe 29 PID 1700 wrote to memory of 456 1700 AstralAimbot_4.2.exe 30 PID 1700 wrote to memory of 456 1700 AstralAimbot_4.2.exe 30 PID 1700 wrote to memory of 456 1700 AstralAimbot_4.2.exe 30 PID 456 wrote to memory of 2420 456 asdsdasd.exe 31 PID 456 wrote to memory of 2420 456 asdsdasd.exe 31 PID 456 wrote to memory of 2420 456 asdsdasd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\AstralAimbot_4.2.exe"C:\Users\Admin\AppData\Local\Temp\AstralAimbot_4.2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:2324
-
-
C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2420
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d3b8122fe1ab8628492ba209d6da8c9d
SHA1f19ba62ca57f4325e15a235dc0b74fa14b5624b2
SHA256657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
SHA512ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a
-
Filesize
3.1MB
MD5d3b8122fe1ab8628492ba209d6da8c9d
SHA1f19ba62ca57f4325e15a235dc0b74fa14b5624b2
SHA256657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
SHA512ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a