Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
15 NOTIFICA......exe
windows7-x64
105 NOTIFICA......exe
windows10-2004-x64
105 NOTIFICA...er.dll
windows7-x64
15 NOTIFICA...er.dll
windows10-2004-x64
15 NOTIFICA...20.dll
windows7-x64
15 NOTIFICA...20.dll
windows10-2004-x64
15 NOTIFICA...20.dll
windows7-x64
15 NOTIFICA...20.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
30/04/2024, 15:51
Static task
static1
Behavioral task
behavioral1
Sample
5 NOTIFICACION DEMANDA/5 NOTIFICACION DEMANDA...exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5 NOTIFICACION DEMANDA/5 NOTIFICACION DEMANDA...exe
Resource
win10v2004-20240419-en
Behavioral task
behavioral3
Sample
5 NOTIFICACION DEMANDA/Register.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
5 NOTIFICACION DEMANDA/Register.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral5
Sample
5 NOTIFICACION DEMANDA/rtl120.dll
Resource
win7-20240419-en
Behavioral task
behavioral6
Sample
5 NOTIFICACION DEMANDA/rtl120.dll
Resource
win10v2004-20240419-en
Behavioral task
behavioral7
Sample
5 NOTIFICACION DEMANDA/vcl120.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
5 NOTIFICACION DEMANDA/vcl120.dll
Resource
win10v2004-20240226-en
General
-
Target
5 NOTIFICACION DEMANDA/5 NOTIFICACION DEMANDA...exe
-
Size
135KB
-
MD5
a2d70fbab5181a509369d96b682fc641
-
SHA1
22afcdc180400c4d2b9e5a6db2b8a26bff54dd38
-
SHA256
8aed681ad8d660257c10d2f0e85ae673184055a341901643f27afc38e5ef8473
-
SHA512
219c6e7e88004fad9f4392be9a852c58fc43b7f6900e40370991427f37eaea5c18f48d2954f9479dde8bcb787345f4e292d5620add8224aec4d93d7968820b83
-
SSDEEP
1536:URLRDTAC1CMoR1CqabJWt7AQFYMGhw1ScCD28v2Vv428fmvxOuw03h9VC:URdV1CMoiqadTQFBGhw1ED28+94hGw
Malware Config
Extracted
asyncrat
| Edit 3LOSH RAT
TRACKMONEY
trackmoney.dynuddns.net:5959
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2992 set thread context of 3260 2992 5 NOTIFICACION DEMANDA...exe 83 PID 3260 set thread context of 4580 3260 cmd.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2992 5 NOTIFICACION DEMANDA...exe 2992 5 NOTIFICACION DEMANDA...exe 3260 cmd.exe 3260 cmd.exe 4580 MSBuild.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2992 5 NOTIFICACION DEMANDA...exe 3260 cmd.exe 3260 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4580 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4580 MSBuild.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2992 wrote to memory of 3260 2992 5 NOTIFICACION DEMANDA...exe 83 PID 2992 wrote to memory of 3260 2992 5 NOTIFICACION DEMANDA...exe 83 PID 2992 wrote to memory of 3260 2992 5 NOTIFICACION DEMANDA...exe 83 PID 2992 wrote to memory of 3260 2992 5 NOTIFICACION DEMANDA...exe 83 PID 3260 wrote to memory of 4580 3260 cmd.exe 89 PID 3260 wrote to memory of 4580 3260 cmd.exe 89 PID 3260 wrote to memory of 4580 3260 cmd.exe 89 PID 3260 wrote to memory of 4580 3260 cmd.exe 89 PID 3260 wrote to memory of 4580 3260 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\5 NOTIFICACION DEMANDA\5 NOTIFICACION DEMANDA...exe"C:\Users\Admin\AppData\Local\Temp\5 NOTIFICACION DEMANDA\5 NOTIFICACION DEMANDA...exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4580
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3440
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
741KB
MD5f3ab8a9ddeeb55f242aaa367c76ae6d6
SHA1b060366b552f388932df4f6fac3c6f15a84955c7
SHA2567151430eef77e376f2a784e36b9ca04191797a983162999a0f1bfcb20fe7f2c7
SHA5128a726d9aa9ea746920b307f56c79b066f974acdcbfc15c81a5c0e153ac63e997aceb53dbd3ad213a3403ea6ac29138c724bb05c09265a11657dea371bcc0b634