Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:14
Static task
static1
Behavioral task
behavioral1
Sample
Notification of transfer made - Santander142023.exe
Resource
win7-20230831-en
General
-
Target
Notification of transfer made - Santander142023.exe
-
Size
168KB
-
MD5
460c5e2904724e5babe7c3f7eaaf8de9
-
SHA1
a648b18830c27850fe651e6601792a7676c18c94
-
SHA256
e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
-
SHA512
31cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
SSDEEP
3072:2L31ZGgcsKuvP6Thmcy6bzVprBAs6UKoq0yiw7bWbJ:83ugdvP6K6b/rBAsq/iwQ
Malware Config
Extracted
asyncrat
1.0.7
Default
donelpacino.ddns.net:5500
DcRatMutex_qwqdanchun
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/2080-8-0x00000000007A0000-0x00000000007B2000-memory.dmp asyncrat -
Executes dropped EXE 2 IoCs
pid Process 4900 notepad.exe 4552 notepad.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3572 set thread context of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 4900 set thread context of 4552 4900 notepad.exe 105 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4796 schtasks.exe 4868 schtasks.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2080 3572 Notification of transfer made - Santander142023.exe 89 PID 3572 wrote to memory of 2596 3572 Notification of transfer made - Santander142023.exe 90 PID 3572 wrote to memory of 2596 3572 Notification of transfer made - Santander142023.exe 90 PID 3572 wrote to memory of 2596 3572 Notification of transfer made - Santander142023.exe 90 PID 3572 wrote to memory of 2356 3572 Notification of transfer made - Santander142023.exe 92 PID 3572 wrote to memory of 2356 3572 Notification of transfer made - Santander142023.exe 92 PID 3572 wrote to memory of 2356 3572 Notification of transfer made - Santander142023.exe 92 PID 3572 wrote to memory of 1240 3572 Notification of transfer made - Santander142023.exe 93 PID 3572 wrote to memory of 1240 3572 Notification of transfer made - Santander142023.exe 93 PID 3572 wrote to memory of 1240 3572 Notification of transfer made - Santander142023.exe 93 PID 2356 wrote to memory of 4868 2356 cmd.exe 96 PID 2356 wrote to memory of 4868 2356 cmd.exe 96 PID 2356 wrote to memory of 4868 2356 cmd.exe 96 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 4552 4900 notepad.exe 105 PID 4900 wrote to memory of 456 4900 notepad.exe 106 PID 4900 wrote to memory of 456 4900 notepad.exe 106 PID 4900 wrote to memory of 456 4900 notepad.exe 106 PID 4900 wrote to memory of 3184 4900 notepad.exe 107 PID 4900 wrote to memory of 3184 4900 notepad.exe 107 PID 4900 wrote to memory of 3184 4900 notepad.exe 107 PID 4900 wrote to memory of 1576 4900 notepad.exe 110 PID 4900 wrote to memory of 1576 4900 notepad.exe 110 PID 4900 wrote to memory of 1576 4900 notepad.exe 110 PID 3184 wrote to memory of 4796 3184 cmd.exe 112 PID 3184 wrote to memory of 4796 3184 cmd.exe 112 PID 3184 wrote to memory of 4796 3184 cmd.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe"2⤵PID:2080
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\notepad"2⤵PID:2596
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f3⤵
- Creates scheduled task(s)
PID:4868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Local\Temp\Notification of transfer made - Santander142023.exe" "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"2⤵PID:1240
-
-
C:\Users\Admin\AppData\Roaming\notepad\notepad.exeC:\Users\Admin\AppData\Roaming\notepad\notepad.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"2⤵
- Executes dropped EXE
PID:4552
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\notepad"2⤵PID:456
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f2⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\notepad\notepad.exe'" /f3⤵
- Creates scheduled task(s)
PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe" "C:\Users\Admin\AppData\Roaming\notepad\notepad.exe"2⤵PID:1576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
520B
MD503febbff58da1d3318c31657d89c8542
SHA1c9e017bd9d0a4fe533795b227c855935d86c2092
SHA2565164770a37b199a79ccd23b399bb3309228973d9f74c589bc2623dc613b37ac4
SHA5123750c372bbca1892e9c1b34681d592c693e725a8b149c3d6938079cd467628cec42c4293b0d886b57a786abf45f5e7229247b3445001774e3e793ff5a3accfa3
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16
-
Filesize
168KB
MD5460c5e2904724e5babe7c3f7eaaf8de9
SHA1a648b18830c27850fe651e6601792a7676c18c94
SHA256e296fd745e2a6dfb3f345a73e59174d5236c9c55855c8ee0c5602955614d9794
SHA51231cf6090a1764abc61aced61fc78e0f9471a636f0e95f997ed083798908c075fb7d5fd78e45d17f5e0ba53d37fe1c7ea8342acb71b0ac41b94e7e1fc6b2b8f16