Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
19/04/2024, 18:19
Behavioral task
behavioral1
Sample
97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe
Resource
win7-20231129-en
General
-
Target
97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe
-
Size
65KB
-
MD5
3712477f2075218e74bdf987b23b578d
-
SHA1
95d8ef64bfc80a2cda65a4992a63083988207f67
-
SHA256
97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990
-
SHA512
1a767e93ca25f0117864a5c3e1eced57a8142d5fc3d300f64f2460aac3e13ae826fc06aba195f75184651f06a76ad8f2c7adeb35ff297dc7a2ce55b9503e2e8f
-
SSDEEP
1536:dumO1TQq726uw/O2CenkR7bExca0tICKfX5WxHd5w:dumaTQq725w/bCenkVbExzCKfX8xHjw
Malware Config
Extracted
asyncrat
0.5.8
Hei
r6rQyqJg4Z3n
-
c2_url_file
http://d.sso.mom:18086/SSIP.html
-
delay
3
-
install
true
-
install_file
Micrcsoft.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000900000001447e-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2596 Micrcsoft.exe -
Loads dropped DLL 1 IoCs
pid Process 2888 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2552 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2572 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe Token: SeDebugPrivilege 2596 Micrcsoft.exe Token: SeDebugPrivilege 2596 Micrcsoft.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2960 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 28 PID 1720 wrote to memory of 2960 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 28 PID 1720 wrote to memory of 2960 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 28 PID 1720 wrote to memory of 2960 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 28 PID 1720 wrote to memory of 2888 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 30 PID 1720 wrote to memory of 2888 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 30 PID 1720 wrote to memory of 2888 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 30 PID 1720 wrote to memory of 2888 1720 97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe 30 PID 2960 wrote to memory of 2552 2960 cmd.exe 32 PID 2960 wrote to memory of 2552 2960 cmd.exe 32 PID 2960 wrote to memory of 2552 2960 cmd.exe 32 PID 2960 wrote to memory of 2552 2960 cmd.exe 32 PID 2888 wrote to memory of 2572 2888 cmd.exe 33 PID 2888 wrote to memory of 2572 2888 cmd.exe 33 PID 2888 wrote to memory of 2572 2888 cmd.exe 33 PID 2888 wrote to memory of 2572 2888 cmd.exe 33 PID 2888 wrote to memory of 2596 2888 cmd.exe 34 PID 2888 wrote to memory of 2596 2888 cmd.exe 34 PID 2888 wrote to memory of 2596 2888 cmd.exe 34 PID 2888 wrote to memory of 2596 2888 cmd.exe 34 PID 2888 wrote to memory of 2596 2888 cmd.exe 34 PID 2888 wrote to memory of 2596 2888 cmd.exe 34 PID 2888 wrote to memory of 2596 2888 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe"C:\Users\Admin\AppData\Local\Temp\97f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Micrcsoft" /tr '"C:\Users\Admin\AppData\Roaming\Micrcsoft.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Micrcsoft" /tr '"C:\Users\Admin\AppData\Roaming\Micrcsoft.exe"'3⤵
- Creates scheduled task(s)
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp1796.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2572
-
-
C:\Users\Admin\AppData\Roaming\Micrcsoft.exe"C:\Users\Admin\AppData\Roaming\Micrcsoft.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD5f9d201636f289efb671c30bede3d9999
SHA1c8d03c839f255b58699334ae4d75ce4e89bc3450
SHA256b94e08f89dc1ab4f8d6885d759e8d6558b756b28a04e44466c139ca94f86f651
SHA51226db6839dc9c6cb868f29a3d27de8ef149fe64f9ce6d8d86fe27b9d5e8f97462e2bb969991f6ad8059b72be146ce170d58ab814b6bccaec8d3d81251af980cc6
-
Filesize
65KB
MD53712477f2075218e74bdf987b23b578d
SHA195d8ef64bfc80a2cda65a4992a63083988207f67
SHA25697f70b6807192398746dd93449c2fdf4353533313c021aca4d0aa5e74f82d990
SHA5121a767e93ca25f0117864a5c3e1eced57a8142d5fc3d300f64f2460aac3e13ae826fc06aba195f75184651f06a76ad8f2c7adeb35ff297dc7a2ce55b9503e2e8f