Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    1s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/01/2024, 10:32

General

  • Target

    4b33702216949b8afe8794ecfc2cf504.exe

  • Size

    4.2MB

  • MD5

    4b33702216949b8afe8794ecfc2cf504

  • SHA1

    76e060bc70507789bb7dd9e3f68ee9f6a8e6718c

  • SHA256

    11004be319514e886ed27a41905e3ef648c307c09219c77917986cf5b5a7665b

  • SHA512

    7cc2ac87c0e5fc0eccfe06ed302da4c42cdbd392f3f2ed8ab53137a82745632906e5adb3fd6fbee4389b6df1bfb9a4b0850e6722331e800bd14df925b9cca5d9

  • SSDEEP

    98304:X14Wq9ua3mHJJPF9d2SxuvtjWQXoB7RDcQ22ZRsFJITw8n7g:l4Wq9uAmfwSxuFjJ4txdRsFOy

Score
10/10

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Async RAT payload 8 IoCs
  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b33702216949b8afe8794ecfc2cf504.exe
    "C:\Users\Admin\AppData\Local\Temp\4b33702216949b8afe8794ecfc2cf504.exe"
    1⤵
      PID:3952
      • C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe
        "C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe"
        2⤵
          PID:1944
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp614A.tmp.bat""
            3⤵
              PID:4364
              • C:\Windows\SysWOW64\timeout.exe
                timeout 3
                4⤵
                • Delays execution with timeout.exe
                PID:4820
              • C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe
                "C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"
                4⤵
                  PID:2468
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows DeepSea" /tr '"C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"' & exit
                3⤵
                  PID:4204
              • C:\Users\Admin\AppData\LocalcvWDakIwue.exe
                "C:\Users\Admin\AppData\LocalcvWDakIwue.exe"
                2⤵
                  PID:3160
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe
                    C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe
                    3⤵
                      PID:4292
                • C:\Windows\system32\AUDIODG.EXE
                  C:\Windows\system32\AUDIODG.EXE 0x33c 0x3dc
                  1⤵
                    PID:3744
                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe
                    "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe"
                    1⤵
                      PID:876
                      • C:\Users\Admin\AppData\Roaming\WindowsApplication.exe
                        "C:\Users\Admin\AppData\Roaming\WindowsApplication.exe"
                        2⤵
                          PID:4180
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\WindowsApplication.exe" "WindowsApplication.exe" ENABLE
                            3⤵
                            • Modifies Windows Firewall
                            PID:2392
                      • C:\Windows\SysWOW64\schtasks.exe
                        schtasks /create /f /sc onlogon /rl highest /tn "Windows DeepSea" /tr '"C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe"'
                        1⤵
                        • Creates scheduled task(s)
                        PID:856

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe

                        Filesize

                        2KB

                        MD5

                        4d9545766b42211458eabb81183111e3

                        SHA1

                        a5cef2384edafbc582df4d37656b09674e6dccc9

                        SHA256

                        c19f30fa9e0bb3e51f1bb036c19288067a6eabed7f72c72fc86f090c8c40b942

                        SHA512

                        b9e7732a14f8bb6a5796c83af1cd7869dc27b45b69212cbe071f8d61e8b29348c89ea751d05b7f6e6c6e6176969c3dc2de3e898f8174af777e3e73a70c96c81e

                      • C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe

                        Filesize

                        58KB

                        MD5

                        9a88421cef050646605428146f09ac92

                        SHA1

                        208869eebc3abd8f592f06129209b86590b71fdf

                        SHA256

                        f5fb3b5c5db0999877b956b42644678f72d1a1a9b1e27128e6842de07765d85f

                        SHA512

                        83112f17788b22053462f7d5c426c85236d1b1996ef0e856f863cfb364aa02d62033c78399f0fa8865c892486c4a1c691babd704b9199cc6fa72217614d8eaed

                      • C:\Users\Admin\AppData\LocalRtQvDmqDGH.exe

                        Filesize

                        29KB

                        MD5

                        472e97cd7cf87df427309b2c0097b3a2

                        SHA1

                        e2c9684beb81e2f75b04096dc5e0823473f9cd58

                        SHA256

                        6a6387c9f02faeafc82177d4018f56ce176854c6fc07424dc30e64c586a658e1

                        SHA512

                        3fc9bc1d391c36d1d3749bf48c0aa5a76e2135a74347d95a1a8af2fd9adcf297e073d8280da15600d2d090e79c6b6e5f12fb32595c8fc358bd37da333b2a7806

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\630_10.png

                        Filesize

                        1KB

                        MD5

                        1b33ac02995fefc5544edbb7a9ddc076

                        SHA1

                        c41787a65d8d2f68af28b0597a8ff54e073badae

                        SHA256

                        453c3e0b7caad342e56f864750d4b9609912f780bbc9e6d694916c1b1a65b2a9

                        SHA512

                        63e3b63c148c80407cc00b6c658c3ac47895ddfef04793640da5679a9b17710a7e4f93edc3d1824e5f71d8cdbd56b6c087f719fbfa7ace9a0d4f1d04dd72a7f0

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.cdd

                        Filesize

                        13KB

                        MD5

                        3e7ecaeb51c2812d13b07ec852d74aaf

                        SHA1

                        e9bdab93596ffb0f7f8c65243c579180939acb26

                        SHA256

                        e7e942993864e8b18780ef10a415f7b93924c6378248c52f0c96895735222b96

                        SHA512

                        635cd5173b595f1905af9eeea65037601cf8496d519c506b6d082662d438c26a1bfe653eaf6edcb117ccf8767975c37ab0238ca4c77574e2706f9b238a15ad4d

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe

                        Filesize

                        29KB

                        MD5

                        e1d172ada0096b936fc1b231ea23d788

                        SHA1

                        fed9ef5cdf0f6bde3aee226bc29919461cbc85f1

                        SHA256

                        8608b3b71c3d700f6b176386c57a67b9a208eddd072d1b90dba03d0c43d26960

                        SHA512

                        df3d51e510cf81f95f169193da9d129efeedc8e74d66f5d7e5af161020e55584ef4c97583807f463e47de1a977a53418846a6458990b17600168157342532134

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\CDS.exe

                        Filesize

                        28KB

                        MD5

                        78fddbf5c50b133028dbd86daead7d0f

                        SHA1

                        aafa1f946115fac7d2d2205776d06d03148cbec8

                        SHA256

                        bd6ecd7298002d64cf1c367dbec511958bcc7f7e55494f6974e1ff444299be02

                        SHA512

                        0b7e6f0a1e1d6c3f87bc3acdbeed9c3d3c8508e65ec7955f30f00a8bad87c81c19040da229c8c640ca9f8f086361b4a0773f2a57814ed474968647aa42a0a476

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\c.dat

                        Filesize

                        1KB

                        MD5

                        a34ec1aae7b7b4abe411db3e7da305c9

                        SHA1

                        c384812885777c162df0ba673d88e4e7607a7bed

                        SHA256

                        8e6216b11a72bc3e80ac239d43c93b50ed21d5540fa314cefffb86e789dcebac

                        SHA512

                        5e483cf2a7800a9e17417b71fc52d5d6d39c2206bc7bfe55eb2f825961fa228a2f6d79dd781a5b26c18949eb337e6d7ac14c4d8a44c5271a62ab5dcbe40f390e

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe

                        Filesize

                        11KB

                        MD5

                        471ea64c6107039d46bcb672fefc8121

                        SHA1

                        8b8abf5d78a5ab69c6931192fe542f07d666dd70

                        SHA256

                        c127b6f0d553e8ed7e168c391d35151b79d9dd9340263116d272b29648a06676

                        SHA512

                        59ef83f62ad1a54d485192c6f173609a16d7420960f5b9f87c5e3dd148038571cffce46fbf43c8493e80d030ec9e646d3ca93d14e40b207671b05d3c96bb52ab

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe

                        Filesize

                        20KB

                        MD5

                        44034dae6fe864f787799935b6ed7741

                        SHA1

                        6545669ff500e5ee527ea43197ef8ce66c0e2705

                        SHA256

                        6f715f613cd05325876974c2f1e6cae71c25d251ee304fbd1f1edfa690fd640b

                        SHA512

                        9c6de60f0b6876aaac4cde660a321e3f2f8c3e66f0632ed8392c11b19ab4b9c7a3188fcc1041cf4646ce172d0be2e4a2e4ff60d48ff995561922600479c2bc68

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\crypted.exe

                        Filesize

                        24KB

                        MD5

                        db63472898000ce5313e5011fe892560

                        SHA1

                        30524736d2cb0acc38a6365f4d2bc871599c2d9b

                        SHA256

                        773bbe27095870b6bc83be96d96198e2edf8ebd3d7c132dfe6275a603e1872f3

                        SHA512

                        f56d15589234ef3310270fcb63a2aa91075f34142e70831b954653a8ae757aeeb2bfcb4460ed6298990d27f4091f52d33fc46ff692dfa787e4e167bf5229737a

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fs.settings

                        Filesize

                        5B

                        MD5

                        68934a3e9455fa72420237eb05902327

                        SHA1

                        7cb6efb98ba5972a9b5090dc2e517fe14d12cb04

                        SHA256

                        fcbcf165908dd18a9e49f7ff27810176db8e9f63b4352213741664245224f8aa

                        SHA512

                        719fa67eef49c4b2a2b83f0c62bddd88c106aaadb7e21ae057c8802b700e36f81fe3f144812d8b05d66dc663d908b25645e153262cf6d457aa34e684af9e328d

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lua5.1.dll

                        Filesize

                        46KB

                        MD5

                        ac1ac0c1f6cfe4a4d882436655c639c5

                        SHA1

                        cf253fff042b09292e34baf419dac63c162fceb4

                        SHA256

                        31e8afa2af828eb689ce3ebe0797d8bc7eaf7d5230fc80063c3019525b8fd1f5

                        SHA512

                        ac707d1691dac4618fd7a58cd5bf5bda25e155084bf3f1d0bc715225f026c0cba9a1029291fdf87391eba6cf2a4212924c3b134817806e6a6bfb8b0ac55d9ea7

                      • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\lua5.1.dll

                        Filesize

                        34KB

                        MD5

                        ac3a989d87ea82a770d65a0f538e234b

                        SHA1

                        ce8a0b4ef9b7475ca4b1c1e7dc98f5ef16770bc4

                        SHA256

                        fc691a7666b86c5be2fbcdcb1a88a4081a6a5bf08dfe6042a4b03ded69d5b008

                        SHA512

                        1c291dccf653fcd167fbc5a74554db9c66a7eccd0c037571f1284388036e6778cac9e5b728ec7ecccd218957518e40e37124d26a923709ab589811cd50c3a9f3

                      • C:\Users\Admin\AppData\Local\Temp\tmp614A.tmp.bat

                        Filesize

                        159B

                        MD5

                        6563092f768e77583753308ae9744200

                        SHA1

                        47bb7d2a3e0f32f4d48ce7d625957eed42f96764

                        SHA256

                        0fb797b1b9bf23ace0089667bfdf3c8d5b1cef573e74470a0bb3af1ed8542a38

                        SHA512

                        d4565cf5efe7335191eb082b2c794d37ac1438f00f634a0419b66cc8fbec5a18cfee793a1b8fd50c7aadec4c0e342bb32ab5f60c052e38aa8d1da8b224c15e94

                      • C:\Users\Admin\AppData\LocalcvWDakIwue.exe

                        Filesize

                        9KB

                        MD5

                        18f72b9246ae0a97637c16a792b6299c

                        SHA1

                        a899a2328837a932c51b01cb3781d9439848918e

                        SHA256

                        1d133a2a9fccb7e5802ec5d64af25cbe7366df96e50af4c72f5dbab90a813cfe

                        SHA512

                        7c5f562f03d8a21dd0425828d306b795a762673147e49fe73396a0f17401bbf9d8070e30443c54469941d2b235cd674fdeee23a8dc10fd64991ef5bcde4d26cb

                      • C:\Users\Admin\AppData\LocalcvWDakIwue.exe

                        Filesize

                        25KB

                        MD5

                        fb3642df773149b209b7ff5fff9d2708

                        SHA1

                        fa2cb365260f725f8e53bcb43ab597ca0872581f

                        SHA256

                        14c56f7fd4ff50033ede5948e57ec31af061f04121ac37724e5b1a6fd1320a15

                        SHA512

                        c0ff371906112aea16206a92a210a414f8aa9adebe9d6c5bd3ab43414cc603b8155c499dae7124f62e4c23207bab55b2bba1464cfcd08e1a6f3ece3526214930

                      • C:\Users\Admin\AppData\LocalcvWDakIwue.exe

                        Filesize

                        33KB

                        MD5

                        2edcfbeea37e7002c13ef8c626bccf00

                        SHA1

                        3729ddc09722ef746605a13ded1704d06681835e

                        SHA256

                        495f79fb8ec6bb9c0c13809f5104e263d427c2a14c5eb3f8391f35784ed4375f

                        SHA512

                        7d6b3df867116893a6cb3d79c859e97305a9df4fd7c7d7516f4afb1e5b64d25ed7d98f588d6ace5eebe0d4f469892f8bc57d38b22422845d55db8e0192748cf6

                      • C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe

                        Filesize

                        19KB

                        MD5

                        a984ec46f8f70d570b43c0648fd26c07

                        SHA1

                        2a126dd01eed448f63d050884de4b97ec6427832

                        SHA256

                        e96af69f851bcbffeaf93afcdfa60fe6b3105b66d3d520e829b13cc3eea6d006

                        SHA512

                        1bcd63bcfc8457a253703dd2e7b9940a22dc363293e37e90e0816dc986862f72f00d7d95b3835f99105a320f5559ce6e4a21b723f41608ccd7651cf5d02ddca1

                      • C:\Users\Admin\AppData\Roaming\Windows DeepSea.exe

                        Filesize

                        29KB

                        MD5

                        c315bf0a2d4486b880514568e2890185

                        SHA1

                        32af13fa713319374b6f1c1797bc96151c5bd96f

                        SHA256

                        7437525feccf47e9138822482e36850bcf12df094fef413b34e8891361ae62d5

                        SHA512

                        973ce1731f09d734c149bfdfc7d698591c3b142a240eb4a038df1a877bd8c836d545ab1ffab53570001932652813ad93c9c01a23da55f7281261e2196490cfde

                      • C:\Users\Admin\AppData\Roaming\WindowsApplication.exe

                        Filesize

                        33KB

                        MD5

                        3c1b89a237201e0e13e7d413eba4decd

                        SHA1

                        f685f3a030ea3aceec922035bda7612b320486d8

                        SHA256

                        6548e65f3b95210af9493720a3b771c548632cbbc1fa93a272a73ac1f7e4d12e

                        SHA512

                        41707c5e05241bb0ce41916a948d2bd5f1970fec333b6d0d9fa422baf67933cc1c87d04d57774a1fece683daff56117d7258d9b8babb00e6ce99fcd4384b6001

                      • C:\Users\Admin\AppData\Roaming\WindowsApplication.exe

                        Filesize

                        13KB

                        MD5

                        0891c66bdd4225c83636418771bdf1aa

                        SHA1

                        f5889695321d4b04e3637279877d8b59449a94bd

                        SHA256

                        02c612bc189253fc1c266ea7b958e8c36382860640e5b877a1e04692115d055a

                        SHA512

                        858ca6a54ba1440c6abdb8bb827671e06bcce17a16a74a65217606bee8920e944b2904806fd221bfa9a5aa577acaf5fa82b5d994614abe7ea6e5565de6f3cc4d

                      • memory/876-76-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/876-77-0x00000000052B0000-0x00000000052C0000-memory.dmp

                        Filesize

                        64KB

                      • memory/876-99-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/876-75-0x00000000006A0000-0x000000000072A000-memory.dmp

                        Filesize

                        552KB

                      • memory/876-78-0x0000000005060000-0x00000000050D6000-memory.dmp

                        Filesize

                        472KB

                      • memory/876-79-0x0000000005870000-0x0000000005E14000-memory.dmp

                        Filesize

                        5.6MB

                      • memory/1944-41-0x0000000004BE0000-0x0000000004C46000-memory.dmp

                        Filesize

                        408KB

                      • memory/1944-54-0x0000000004D90000-0x0000000004E22000-memory.dmp

                        Filesize

                        584KB

                      • memory/1944-31-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1944-80-0x0000000002780000-0x0000000002790000-memory.dmp

                        Filesize

                        64KB

                      • memory/1944-86-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/1944-28-0x0000000000360000-0x00000000003F2000-memory.dmp

                        Filesize

                        584KB

                      • memory/2468-120-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/2468-106-0x0000000005A10000-0x0000000005A20000-memory.dmp

                        Filesize

                        64KB

                      • memory/2468-105-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3952-2-0x00000000058E0000-0x000000000597C000-memory.dmp

                        Filesize

                        624KB

                      • memory/3952-4-0x0000000005AF0000-0x0000000005F30000-memory.dmp

                        Filesize

                        4.2MB

                      • memory/3952-3-0x0000000003460000-0x0000000003470000-memory.dmp

                        Filesize

                        64KB

                      • memory/3952-0-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/3952-1-0x0000000000A80000-0x0000000000EC8000-memory.dmp

                        Filesize

                        4.3MB

                      • memory/3952-32-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4180-100-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4180-101-0x00000000028C0000-0x00000000028D0000-memory.dmp

                        Filesize

                        64KB

                      • memory/4180-107-0x0000000005270000-0x000000000527A000-memory.dmp

                        Filesize

                        40KB

                      • memory/4180-118-0x0000000074F30000-0x00000000756E0000-memory.dmp

                        Filesize

                        7.7MB

                      • memory/4180-119-0x00000000028C0000-0x00000000028D0000-memory.dmp

                        Filesize

                        64KB