Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 01:20
Behavioral task
behavioral1
Sample
f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe
Resource
win7-20240508-en
General
-
Target
f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe
-
Size
48KB
-
MD5
36b7614f2f6b0788e6c2be5def44c68f
-
SHA1
0aca41d981fbc11d8eee8d7c668fc68637b4985c
-
SHA256
f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263
-
SHA512
b1243336e444127b0931c9cc5ce7e364540dd1fba1d25e9b7384e6d1d6d68036d7ea46b2c56592c20891d2d085af319286eda4eef57c1056bed97abdcb1d2449
-
SSDEEP
768:AukzVT0kLd3WULgPdVmo2qDnJTTb2cWss3kPIDeR+0b01D1wKgHEujzhrNYNKBDq:AukzVT0Mq12qJnHDyJDeRxb0nngkuprw
Malware Config
Extracted
asyncrat
0.5.7B
Default
61.14.233.130:6606
61.14.233.130:7707
61.14.233.130:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
Sysbin.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000900000002339a-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\Control Panel\International\Geo\Nation f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe -
Executes dropped EXE 1 IoCs
pid Process 3096 Sysbin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1036 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3216 timeout.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe Token: SeDebugPrivilege 3096 Sysbin.exe Token: SeDebugPrivilege 3096 Sysbin.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2964 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 82 PID 4084 wrote to memory of 2964 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 82 PID 4084 wrote to memory of 2964 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 82 PID 4084 wrote to memory of 3504 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 84 PID 4084 wrote to memory of 3504 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 84 PID 4084 wrote to memory of 3504 4084 f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe 84 PID 3504 wrote to memory of 3216 3504 cmd.exe 86 PID 3504 wrote to memory of 3216 3504 cmd.exe 86 PID 3504 wrote to memory of 3216 3504 cmd.exe 86 PID 2964 wrote to memory of 1036 2964 cmd.exe 87 PID 2964 wrote to memory of 1036 2964 cmd.exe 87 PID 2964 wrote to memory of 1036 2964 cmd.exe 87 PID 3504 wrote to memory of 3096 3504 cmd.exe 88 PID 3504 wrote to memory of 3096 3504 cmd.exe 88 PID 3504 wrote to memory of 3096 3504 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe"C:\Users\Admin\AppData\Local\Temp\f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Sysbin" /tr '"C:\Users\Admin\AppData\Roaming\Sysbin.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Sysbin" /tr '"C:\Users\Admin\AppData\Roaming\Sysbin.exe"'3⤵
- Creates scheduled task(s)
PID:1036
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp4594.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3216
-
-
C:\Users\Admin\AppData\Roaming\Sysbin.exe"C:\Users\Admin\AppData\Roaming\Sysbin.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD56a93f4469c686a70942408121361e3cb
SHA1ff13fafce97f1eb117a5766da2165777103c5a88
SHA25670e72533f0203c2bd5f5ee4b0f3ae6f5c15ee36a16fb8725d22dd791b2464fc1
SHA5125a41e1d23df1656b1bd3080658af5fd57d8b60d7546a6dc3127036cd3aa6f6e87c927a388a8f8ff3dfc6e67c01720f57ab5214ac529f011bccb039a71190c030
-
Filesize
48KB
MD536b7614f2f6b0788e6c2be5def44c68f
SHA10aca41d981fbc11d8eee8d7c668fc68637b4985c
SHA256f5efd1b435706c4eb87582528b1f34825765cc5324f768a93d763b31642f8263
SHA512b1243336e444127b0931c9cc5ce7e364540dd1fba1d25e9b7384e6d1d6d68036d7ea46b2c56592c20891d2d085af319286eda4eef57c1056bed97abdcb1d2449