Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3Asuna Lite/Asuna.exe
windows7-x64
3Asuna Lite/Asuna.exe
windows10-2004-x64
1Asuna Lite/Asuna.exe
windows7-x64
1Asuna Lite/Asuna.exe
windows10-2004-x64
7Asuna Lite...ss.dll
windows7-x64
1Asuna Lite...ss.dll
windows10-2004-x64
1Asuna Lite...rp.dll
windows7-x64
1Asuna Lite...rp.dll
windows10-2004-x64
1Asuna Lite...PI.dll
windows7-x64
1Asuna Lite...PI.dll
windows10-2004-x64
1Analysis
-
max time kernel
143s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
Asuna Lite/Asuna.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Asuna Lite/Asuna.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Asuna Lite/Asuna.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Asuna Lite/Asuna.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
Asuna Lite/SharpCompress.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Asuna Lite/SharpCompress.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
Asuna Lite/ZstdSharp.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
Asuna Lite/ZstdSharp.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
Asuna Lite/bin/API.dll
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Asuna Lite/bin/API.dll
Resource
win10v2004-20240709-en
General
-
Target
Asuna Lite/Asuna.exe
-
Size
363KB
-
MD5
14eded1661b6adcfa19d9cd43b7a8148
-
SHA1
ee970fac39ed665195fc89fba0114c2dfb663c11
-
SHA256
6e9c819d4327b2319a9a336acc4f5b7c53e0b284ea66d28534a485a8d038dc94
-
SHA512
8c6d356e9ecacc7c5b9d2e79b80a5924f0cd790132734af52f2d4a1da3dffaac1a924c4b19fb7b1bfe7618828b4f24f912431c9c74baf15281daf44271febb74
-
SSDEEP
6144:xAi4pxpRkyHRZa0Gl278IVNcIcW+EbIo98QG9SZyMMyzmBlpkvOD:x4RlGI78IVlbIoSV9SZynnloO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation Asuna.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation Flexer.exe -
Executes dropped EXE 1 IoCs
pid Process 64 Flexer.exe -
Loads dropped DLL 1 IoCs
pid Process 64 Flexer.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 22 pastebin.com 24 raw.githubusercontent.com 25 raw.githubusercontent.com 67 pastebin.com 21 pastebin.com -
pid Process 2284 powershell.exe 4876 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Flexer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer Flexer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion Flexer.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2284 powershell.exe 2284 powershell.exe 2284 powershell.exe 4876 powershell.exe 4876 powershell.exe 4876 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2284 powershell.exe Token: SeDebugPrivilege 4740 Asuna.exe Token: SeDebugPrivilege 4876 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2284 4740 Asuna.exe 99 PID 4740 wrote to memory of 2284 4740 Asuna.exe 99 PID 4740 wrote to memory of 4876 4740 Asuna.exe 102 PID 4740 wrote to memory of 4876 4740 Asuna.exe 102 PID 4740 wrote to memory of 64 4740 Asuna.exe 105 PID 4740 wrote to memory of 64 4740 Asuna.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\Asuna Lite\Asuna.exe"C:\Users\Admin\AppData\Local\Temp\Asuna Lite\Asuna.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -NoProfile -Command " $ws = New-Object -ComObject WScript.Shell $shortcut = $ws.CreateShortcut('C:\Users\Admin\Desktop\Flexer.lnk') $shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe' $shortcut.Save() "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -NoProfile -Command " $ws = New-Object -ComObject WScript.Shell $shortcut = $ws.CreateShortcut('C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Flexer.lnk') $shortcut.TargetPath = 'C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe' $shortcut.Save() "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe"C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Enumerates system info in registry
PID:64
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1704
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5d0b566a81cc36166344998426d351695
SHA179d9be955801bb25ffafc3a216a80cde82de1519
SHA256b2a9cad37ba737f306f2523f8d46866705ff038e437cb342eb2255c1f9329a89
SHA5125df8e27cff7e6716b49899c0d55d1962243b008b6cee775559198c318e2797f8c159d4469d03e9b2b552ad4d4f4d59903426383fba30ca436280bc19b002a4f6
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe.WebView2\EBWebView\Default\Session Storage\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe.WebView2\EBWebView\Default\Session Storage\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe.WebView2\EBWebView\GraphiteDawnCache\data_0
Filesize8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe.WebView2\EBWebView\GraphiteDawnCache\data_1
Filesize264KB
MD595676ffdc654fbcde7620362e7f67954
SHA1ad526c7da5b85eb23755e5162dcb1743cf50fae7
SHA25658cf848c9ac43f3e179bebc513c93585a6ee05d3a5711f4cf9fbf092a0af4660
SHA51264bcdae8dab44d51e01558aa0a34abb638867a1b987374ef999d48b43bc4df7d41506b7187267b5dd9e4509d9adb073bba3bda63f59f4c059b0ddb8abbfdd33f
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe.WebView2\EBWebView\GraphiteDawnCache\data_2
Filesize8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Flexer.exe.WebView2\EBWebView\GraphiteDawnCache\data_3
Filesize8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
C:\Users\Admin\AppData\Local\GOTji\Flexers\miyukiClient\Monaco\package\esm\vs\base\browser\ui\table\table.js
Filesize368B
MD5dff5cd240217dc0e722c27be242db91d
SHA1244d1e7b3a10bb26e52ad9019e0e20f8bb3a72aa
SHA256151caa77914089aa02273bb851f4b9a198eaab38da7eb9e4bdd7af8075c2dc57
SHA512e6033e28f65f29ec3a7fc2e367bb6dd2909e38e5e5ccd267fe920e82c25de00c3cf5593db022dc1664ec00652882d5093121f2686788ee3eb60d0b2d87fef6d5
-
Filesize
161KB
MD5c5f0c46e91f354c58ecec864614157d7
SHA1cb6f85c0b716b4fc3810deb3eb9053beb07e803c
SHA256465a7ddfb3a0da4c3965daf2ad6ac7548513f42329b58aebc337311c10ea0a6f
SHA512287756078aa08130907bd8601b957e9e006cef9f5c6765df25cfaa64ddd0fff7d92ffa11f10a00a4028687f3220efda8c64008dbcf205bedae5da296e3896e91
-
Filesize
7B
MD5260ca9dd8a4577fc00b7bd5810298076
SHA153a5687cb26dc41f2ab4033e97e13adefd3740d6
SHA256aee408847d35e44e99430f0979c3357b85fe8dbb4535a494301198adbee85f27
SHA51251e85deb51c2b909a21ec5b8e83b1cb28da258b1be227620105a345a2bd4c6aea549cd5429670f2df33324667b9f623a420b3a0bdbbd03ad48602211e75478a7
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD5055cd1930e45c3d77aa744d53bcc29d9
SHA1af1464daf329f36930b71fb33119c61a13472b6d
SHA256fcd4a469c653f6bd319b201326633c2183a70184bc159c071915a9c4abd92d3c
SHA51200ee038f281f34c7d727b7d6d7734bdfc61ee742b33edc5f905adae6afa949b9a9da8c575d949e98b24b59005e469628e99f113e0fc612dc24bbba7f098fa65d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82