Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22/05/2024, 17:14
Behavioral task
behavioral1
Sample
f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe
Resource
win7-20240508-en
4 signatures
150 seconds
General
-
Target
f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe
-
Size
66KB
-
MD5
61493cab2bee3adb50e42de80a644870
-
SHA1
5fa0d6d7954e5c8ca9fc492468b4f7b4c4a59bf8
-
SHA256
f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961
-
SHA512
433880261418cc8e65c17c550343d41bc0758b1cdda700ab2ec8fc93e64369ebcd1a528ee91d971fb7b7f2443958fe3c8807e9c768bd1af6df216ab83b98b923
-
SSDEEP
1536:cmfWSqHdykrVMKuJUYFmeBu+bki+j756BUirQTGdx:cmeSqHdykGKuJUYFm/+bkl9yG2x
Malware Config
Extracted
Family
asyncrat
Version
| Edit 3LOSH RAT
Botnet
Default
C2
127.0.0.1:4444
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2012 f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2012 f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe"C:\Users\Admin\AppData\Local\Temp\f71f3ef4b6047883160f20eb8887fed6ce37c6273b46cc41cb6d7cffdb51c961.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2012