Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/02/2024, 11:00
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20231129-en
General
-
Target
Client.exe
-
Size
47KB
-
MD5
304d41baaa716a6d582877785f93ef68
-
SHA1
a2b16217d6326c54fbd7ca5586519d50ce3e20ca
-
SHA256
760d61c1b76f9a909e2e427ed60c7cc76ebb32246b8aec5459d882a04482b1ea
-
SHA512
2a1f1859bf1ee1ff3be5469d44daf96ba8e6f26e377a6e538e64be815d4e7eb87911b0cbd2cddd3135c2f0e6933151fc47f8aeefa22e7becfa1babb8d38f3a41
-
SSDEEP
768:59n7mxUzILWCaS+Di1xCKzVixM8YbxgeXP9RavEgK/JXZVc6KN:597AKW1xCGLzb+SPTankJXZVclN
Malware Config
Extracted
asyncrat
1.0.7
Default
127.0.0.1:8848
127.0.0.1:16234
6.tcp.eu.ngrok.io:8848
6.tcp.eu.ngrok.io:16234
DcRatMutex_qwqdanchun
-
delay
1
-
install
true
-
install_file
WindowsDefender.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0007000000023214-9.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
pid Process 3400 WindowsDefender.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 23 6.tcp.eu.ngrok.io 52 6.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4912 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2236 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe 2948 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2948 Client.exe Token: SeDebugPrivilege 3400 WindowsDefender.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2948 wrote to memory of 412 2948 Client.exe 83 PID 2948 wrote to memory of 412 2948 Client.exe 83 PID 2948 wrote to memory of 4988 2948 Client.exe 85 PID 2948 wrote to memory of 4988 2948 Client.exe 85 PID 4988 wrote to memory of 2236 4988 cmd.exe 87 PID 4988 wrote to memory of 2236 4988 cmd.exe 87 PID 412 wrote to memory of 4912 412 cmd.exe 88 PID 412 wrote to memory of 4912 412 cmd.exe 88 PID 4988 wrote to memory of 3400 4988 cmd.exe 89 PID 4988 wrote to memory of 3400 4988 cmd.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\Admin\AppData\Roaming\WindowsDefender.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WindowsDefender" /tr '"C:\Users\Admin\AppData\Roaming\WindowsDefender.exe"'3⤵
- Creates scheduled task(s)
PID:4912
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp47E6.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2236
-
-
C:\Users\Admin\AppData\Roaming\WindowsDefender.exe"C:\Users\Admin\AppData\Roaming\WindowsDefender.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159B
MD5e7620e8e620b3c63196e7247f73ff89c
SHA15ffce5ef7c078d3fac848dfb3408fcac8e5e73a3
SHA256baf0f9eb70aa4672b34092a330ec4743123108331faaadf00fabad33b06cf632
SHA51276f9e1097008cbf0104db74581e133ae450cc2b8d7bc2a933e27446572fafaecc4e8e9774c58db3ff16cf874bb6f9f75c3e9ab96946dd92444cb8ca217054eb0
-
Filesize
47KB
MD5304d41baaa716a6d582877785f93ef68
SHA1a2b16217d6326c54fbd7ca5586519d50ce3e20ca
SHA256760d61c1b76f9a909e2e427ed60c7cc76ebb32246b8aec5459d882a04482b1ea
SHA5122a1f1859bf1ee1ff3be5469d44daf96ba8e6f26e377a6e538e64be815d4e7eb87911b0cbd2cddd3135c2f0e6933151fc47f8aeefa22e7becfa1babb8d38f3a41