Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3Asuna+Lite.zip
windows7-x64
1Asuna+Lite.zip
windows10-2004-x64
1Asuna Lite...s.json
windows7-x64
3Asuna Lite...s.json
windows10-2004-x64
3Asuna Lite/Asuna.exe
windows7-x64
1Asuna Lite/Asuna.exe
windows10-2004-x64
1Asuna Lite/Asuna.exe
windows7-x64
1Asuna Lite/Asuna.exe
windows10-2004-x64
10Asuna Lite...g.json
windows7-x64
3Asuna Lite...g.json
windows10-2004-x64
3Asuna Lite...ss.dll
windows7-x64
3Asuna Lite...ss.dll
windows10-2004-x64
1Asuna Lite...rp.dll
windows7-x64
1Asuna Lite...rp.dll
windows10-2004-x64
1Asuna Lite...PI.dll
windows7-x64
1Asuna Lite...PI.dll
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 05:35
Static task
static1
Behavioral task
behavioral1
Sample
Asuna+Lite.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Asuna+Lite.zip
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
Asuna Lite/Asuna.deps.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Asuna Lite/Asuna.deps.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Asuna Lite/Asuna.exe
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
Asuna Lite/Asuna.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Asuna Lite/Asuna.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
Asuna Lite/Asuna.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Asuna Lite/Asuna.runtimeconfig.json
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
Asuna Lite/Asuna.runtimeconfig.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Asuna Lite/SharpCompress.dll
Resource
win7-20240708-en
Behavioral task
behavioral12
Sample
Asuna Lite/SharpCompress.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
Asuna Lite/ZstdSharp.dll
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
Asuna Lite/ZstdSharp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Asuna Lite/bin/API.dll
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
Asuna Lite/bin/API.dll
Resource
win10v2004-20240709-en
General
-
Target
Asuna Lite/Asuna.runtimeconfig.json
-
Size
340B
-
MD5
253333997e82f7d44ea8072dfae6db39
-
SHA1
03b9744e89327431a619505a7c72fd497783d884
-
SHA256
28329cf08f6505e73806b17558b187c02f0c1c516fe47ebfb7a013d082aaa306
-
SHA512
56d99039e0fb6305588e9f87361e7e0d5051507bf321ba36619c4d29741f35c27c62f025a52523c9e1c7287aabf1533444330a8cdf840fa5af0fa2241fcb4fc2
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.json rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\json_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1385883288-3042840365-2734249351-1000_CLASSES\.json\ = "json_auto_file" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2896 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 AcroRd32.exe 2896 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2348 2436 cmd.exe 31 PID 2436 wrote to memory of 2348 2436 cmd.exe 31 PID 2436 wrote to memory of 2348 2436 cmd.exe 31 PID 2348 wrote to memory of 2896 2348 rundll32.exe 32 PID 2348 wrote to memory of 2896 2348 rundll32.exe 32 PID 2348 wrote to memory of 2896 2348 rundll32.exe 32 PID 2348 wrote to memory of 2896 2348 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\Asuna Lite\Asuna.runtimeconfig.json"1⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Asuna Lite\Asuna.runtimeconfig.json2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Asuna Lite\Asuna.runtimeconfig.json"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5e0ee7c4228d7c52e2f631a5eb1a04a34
SHA1d77abac7983e7c576e5457c279f14706028859f1
SHA256571d5a8442822a601ef216ab94f0342a0a2c0f0a3b7814b80de3a51e284d42d2
SHA51241a5eca260809f62b3105af08e08e39ef488026f6a81c25dd86b0704a99aa4ff8f213bc0646c3129bd5590023995d86a21db6cb3d428e4e32678ef49c5fa9c65