Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
688s -
max time network
693s -
platform
windows10-1703_x64 -
resource
win10-20230703-en -
resource tags
arch:x64arch:x86image:win10-20230703-enlocale:en-usos:windows10-1703-x64system -
submitted
27/08/2023, 06:02
Behavioral task
behavioral1
Sample
AstralAimbot_4.2.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
AstralAimbot_4.2.exe
Resource
win10-20230703-en
General
-
Target
AstralAimbot_4.2.exe
-
Size
3.1MB
-
MD5
d3b8122fe1ab8628492ba209d6da8c9d
-
SHA1
f19ba62ca57f4325e15a235dc0b74fa14b5624b2
-
SHA256
657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
-
SHA512
ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a
-
SSDEEP
49152:Cvht62XlaSFNWPjljiFa2RoUYIQi/bdpqUoGdZizoTHHB72eh2NT:CvL62XlaSFNWPjljiFXRoUYIF/b8
Malware Config
Extracted
quasar
1.4.1
asdasd
6.tcp.ngrok.io:18160
a05bb804-7a29-47fc-917b-02ee2cb4b1a2
-
encryption_key
02C7E31FB83C81538B3B7AEA158F1FCCDC2B0FEA
-
install_name
asdsdasd.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
SystEm32
-
subdirectory
dasdasd
Signatures
-
Quasar payload 3 IoCs
resource yara_rule behavioral2/memory/3472-0-0x00000000000A0000-0x00000000003C4000-memory.dmp family_quasar behavioral2/files/0x000700000001afb2-6.dat family_quasar behavioral2/files/0x000700000001afb2-7.dat family_quasar -
Executes dropped EXE 1 IoCs
pid Process 4608 asdsdasd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3820 schtasks.exe 4444 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3472 AstralAimbot_4.2.exe Token: SeDebugPrivilege 4608 asdsdasd.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 4608 asdsdasd.exe 4608 asdsdasd.exe 4608 asdsdasd.exe 4608 asdsdasd.exe 4608 asdsdasd.exe -
Suspicious use of SendNotifyMessage 5 IoCs
pid Process 4608 asdsdasd.exe 4608 asdsdasd.exe 4608 asdsdasd.exe 4608 asdsdasd.exe 4608 asdsdasd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4608 asdsdasd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3820 3472 AstralAimbot_4.2.exe 71 PID 3472 wrote to memory of 3820 3472 AstralAimbot_4.2.exe 71 PID 3472 wrote to memory of 4608 3472 AstralAimbot_4.2.exe 72 PID 3472 wrote to memory of 4608 3472 AstralAimbot_4.2.exe 72 PID 4608 wrote to memory of 4444 4608 asdsdasd.exe 73 PID 4608 wrote to memory of 4444 4608 asdsdasd.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\AstralAimbot_4.2.exe"C:\Users\Admin\AppData\Local\Temp\AstralAimbot_4.2.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3820
-
-
C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "SystEm32" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\dasdasd\asdsdasd.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4444
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD5d3b8122fe1ab8628492ba209d6da8c9d
SHA1f19ba62ca57f4325e15a235dc0b74fa14b5624b2
SHA256657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
SHA512ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a
-
Filesize
3.1MB
MD5d3b8122fe1ab8628492ba209d6da8c9d
SHA1f19ba62ca57f4325e15a235dc0b74fa14b5624b2
SHA256657fe3aede0f8a15771857f90cd59d8232b225d76b53bfe538a15089dea956a5
SHA512ed3e762d7fbbddb265f96202db08dce57c7f03b4b73d537a0f497e410391d2e1d0eb0129a3a2a5e5c2c7352123ae765d8e891b9b5dce83eb1eaaaefc04af5b1a