Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/04/2024, 21:07
Behavioral task
behavioral1
Sample
a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe
Resource
win7-20240215-en
General
-
Target
a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe
-
Size
47KB
-
MD5
0c35e8c36f627e8801c85a26d7e63b2b
-
SHA1
9d0d43a793ba17b89d9af95d48c30f5c6757288e
-
SHA256
a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad
-
SHA512
fc7e01c70faa4ec8425456bd2357f288bcd39d65e090423e7aea407de008c56bcb7812cefc5f476680fb57616641bb02ac21b1caf72b264d73b04e21c5ed77ac
-
SSDEEP
768:MukjVT0kLd3WULVPdVmo2qDNg8YwBTNNMPI4TGKXCp5/0b6rwxE1+LimhQ5JBDZ2:MukjVT0M912zwBXx4iEZb6ru7icsd0x
Malware Config
Extracted
asyncrat
0.5.8
Default
4.tcp.eu.ngrok.io:4040
4.tcp.eu.ngrok.io:120
4.tcp.eu.ngrok.io:14232
AWCmV7whrG8q
-
delay
3
-
install
true
-
install_file
sellam.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a000000012236-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2656 sellam.exe -
Loads dropped DLL 1 IoCs
pid Process 2568 cmd.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 2 4.tcp.eu.ngrok.io 8 4.tcp.eu.ngrok.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2508 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2200 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe Token: SeDebugPrivilege 2656 sellam.exe Token: SeDebugPrivilege 2656 sellam.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1724 wrote to memory of 2976 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 28 PID 1724 wrote to memory of 2976 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 28 PID 1724 wrote to memory of 2976 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 28 PID 1724 wrote to memory of 2976 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 28 PID 1724 wrote to memory of 2568 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 30 PID 1724 wrote to memory of 2568 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 30 PID 1724 wrote to memory of 2568 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 30 PID 1724 wrote to memory of 2568 1724 a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe 30 PID 2976 wrote to memory of 2508 2976 cmd.exe 32 PID 2976 wrote to memory of 2508 2976 cmd.exe 32 PID 2976 wrote to memory of 2508 2976 cmd.exe 32 PID 2976 wrote to memory of 2508 2976 cmd.exe 32 PID 2568 wrote to memory of 2200 2568 cmd.exe 33 PID 2568 wrote to memory of 2200 2568 cmd.exe 33 PID 2568 wrote to memory of 2200 2568 cmd.exe 33 PID 2568 wrote to memory of 2200 2568 cmd.exe 33 PID 2568 wrote to memory of 2656 2568 cmd.exe 34 PID 2568 wrote to memory of 2656 2568 cmd.exe 34 PID 2568 wrote to memory of 2656 2568 cmd.exe 34 PID 2568 wrote to memory of 2656 2568 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe"C:\Users\Admin\AppData\Local\Temp\a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "sellam" /tr '"C:\Users\Admin\AppData\Roaming\sellam.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "sellam" /tr '"C:\Users\Admin\AppData\Roaming\sellam.exe"'3⤵
- Creates scheduled task(s)
PID:2508
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp27AC.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2200
-
-
C:\Users\Admin\AppData\Roaming\sellam.exe"C:\Users\Admin\AppData\Roaming\sellam.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2656
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD588cc2e02d71a6d7e76bc4bbe84dcadb0
SHA1d6c4f11f7b2cbbf053d2f1103b0e8c851253fa0a
SHA2565a1741090313c85ad2c989211b7d31b27b3f3b9c227455114e59a09947cb4bf6
SHA512a44e799ee923686f668c09ccc564cc3cb024d45073c01c8a2aebc882e9fca4b704ee7ca99fc2886eda7a833bc57a6cde8b092b450d68fe1a0380631fb64e8e3e
-
Filesize
47KB
MD50c35e8c36f627e8801c85a26d7e63b2b
SHA19d0d43a793ba17b89d9af95d48c30f5c6757288e
SHA256a9943104ff50fc79bf86d3fd41389bd395f871b7bb2b413a1ac628a9b679fcad
SHA512fc7e01c70faa4ec8425456bd2357f288bcd39d65e090423e7aea407de008c56bcb7812cefc5f476680fb57616641bb02ac21b1caf72b264d73b04e21c5ed77ac