Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
135s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
13/10/2023, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
Notification of transfer made - Santander142023.exe
Resource
win7-20230831-en
General
-
Target
Notification of transfer made - Santander142023.exe
-
Size
168KB
-
MD5
460c5e2904724e5babe7c3f7eaaf8de9
-
SHA1
a648b18830c27850fe651e6601792a7676c18c94
-
SHA256
e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
-
SHA512
31cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
SSDEEP
3072:2L31ZGgcsKuvP6Thmcy6bzVprBAs6UKoq0yiw7bWbJ:83ugdvP6K6b/rBAsq/iwQ
Malware Config
Extracted
asyncrat
1.0.7
Default
donelpacino.ddns.net:5500
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 8 IoCs
resource yara_rule behavioral1/memory/740-10-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/740-7-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/740-6-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/740-12-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/740-14-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2556-63-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/2556-60-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat behavioral1/memory/2556-56-0x0000000000080000-0x0000000000092000-memory.dmp asyncrat -
Executes dropped EXE 4 IoCs
pid Process 2012 notepad.exe 1264 notepad.exe 1752 notepad.exe 2556 notepad.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2076 set thread context of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2012 set thread context of 1264 2012 notepad.exe 40 PID 1752 set thread context of 2556 1752 notepad.exe 49 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 852 schtasks.exe 1932 schtasks.exe 1260 schtasks.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 740 2076 Notification of transfer made - Santander142023.exe 28 PID 2076 wrote to memory of 2624 2076 Notification of transfer made - Santander142023.exe 29 PID 2076 wrote to memory of 2624 2076 Notification of transfer made - Santander142023.exe 29 PID 2076 wrote to memory of 2624 2076 Notification of transfer made - Santander142023.exe 29 PID 2076 wrote to memory of 2624 2076 Notification of transfer made - Santander142023.exe 29 PID 2076 wrote to memory of 2712 2076 Notification of transfer made - Santander142023.exe 31 PID 2076 wrote to memory of 2712 2076 Notification of transfer made - Santander142023.exe 31 PID 2076 wrote to memory of 2712 2076 Notification of transfer made - Santander142023.exe 31 PID 2076 wrote to memory of 2712 2076 Notification of transfer made - Santander142023.exe 31 PID 2076 wrote to memory of 2744 2076 Notification of transfer made - Santander142023.exe 32 PID 2076 wrote to memory of 2744 2076 Notification of transfer made - Santander142023.exe 32 PID 2076 wrote to memory of 2744 2076 Notification of transfer made - Santander142023.exe 32 PID 2076 wrote to memory of 2744 2076 Notification of transfer made - Santander142023.exe 32 PID 2712 wrote to memory of 852 2712 cmd.exe 35 PID 2712 wrote to memory of 852 2712 cmd.exe 35 PID 2712 wrote to memory of 852 2712 cmd.exe 35 PID 2712 wrote to memory of 852 2712 cmd.exe 35 PID 2516 wrote to memory of 2012 2516 taskeng.exe 39 PID 2516 wrote to memory of 2012 2516 taskeng.exe 39 PID 2516 wrote to memory of 2012 2516 taskeng.exe 39 PID 2516 wrote to memory of 2012 2516 taskeng.exe 39 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 1264 2012 notepad.exe 40 PID 2012 wrote to memory of 2828 2012 notepad.exe 41 PID 2012 wrote to memory of 2828 2012 notepad.exe 41 PID 2012 wrote to memory of 2828 2012 notepad.exe 41 PID 2012 wrote to memory of 2828 2012 notepad.exe 41 PID 2012 wrote to memory of 2988 2012 notepad.exe 44 PID 2012 wrote to memory of 2988 2012 notepad.exe 44 PID 2012 wrote to memory of 2988 2012 notepad.exe 44 PID 2012 wrote to memory of 2988 2012 notepad.exe 44 PID 2012 wrote to memory of 2992 2012 notepad.exe 42 PID 2012 wrote to memory of 2992 2012 notepad.exe 42 PID 2012 wrote to memory of 2992 2012 notepad.exe 42 PID 2012 wrote to memory of 2992 2012 notepad.exe 42 PID 2988 wrote to memory of 1932 2988 cmd.exe 47 PID 2988 wrote to memory of 1932 2988 cmd.exe 47 PID 2988 wrote to memory of 1932 2988 cmd.exe 47 PID 2988 wrote to memory of 1932 2988 cmd.exe 47 PID 2516 wrote to memory of 1752 2516 taskeng.exe 48 PID 2516 wrote to memory of 1752 2516 taskeng.exe 48 PID 2516 wrote to memory of 1752 2516 taskeng.exe 48 PID 2516 wrote to memory of 1752 2516 taskeng.exe 48 PID 1752 wrote to memory of 2556 1752 notepad.exe 49 PID 1752 wrote to memory of 2556 1752 notepad.exe 49 PID 1752 wrote to memory of 2556 1752 notepad.exe 49 PID 1752 wrote to memory of 2556 1752 notepad.exe 49 PID 1752 wrote to memory of 2556 1752 notepad.exe 49 PID 1752 wrote to memory of 2556 1752 notepad.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"2⤵PID:740
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\notepad"2⤵PID:2624
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f3⤵
- Creates scheduled task(s)
PID:852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe" "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"2⤵PID:2744
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {468DCE6E-CB96-44D8-947E-218079501F05} S-1-5-21-3849525425-30183055-657688904-1000:KGPMNUDG\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Roaming\notepad\notepad.exeC:\Users\Admin\AppData\Roaming\notepad\notepad.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"3⤵
- Executes dropped EXE
PID:1264
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\notepad"3⤵PID:2828
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe" "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"3⤵PID:2992
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f4⤵
- Creates scheduled task(s)
PID:1932
-
-
-
-
C:\Users\Admin\AppData\Roaming\notepad\notepad.exeC:\Users\Admin\AppData\Roaming\notepad\notepad.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"3⤵
- Executes dropped EXE
PID:2556
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\notepad"3⤵PID:1928
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f3⤵PID:1592
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f4⤵
- Creates scheduled task(s)
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe" "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"3⤵PID:1268
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16