Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    95s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/08/2024, 23:51

General

  • Target

    RC7 (5) (1)/First.exe

  • Size

    139KB

  • MD5

    d5f71f93624190439b569498acca69a9

  • SHA1

    323c616a5ed5e680b221f1db6acfa222e8be719a

  • SHA256

    8bcb2329f01af33a1707f6a1a749987cfaff3976a9bcdbffad37d477dd5fd8ab

  • SHA512

    e03043bbd4389f77d337a33d92764496bd5a84654a95a3792de0a025765d43a795ef1351a64d96c6ae1f85daadc68a1c1fdc192a9adb153a15cf1cb71607b715

  • SSDEEP

    3072:+iS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJK8ltX:+iS4ompB9S3BZi0a1G78IVhcgct

Malware Config

Extracted

Family

asyncrat

Version

0.5.8

Botnet

Default

C2

45.90.13.137:7707

Mutex

HleCBmrMxwFA

Attributes
  • delay

    3

  • install

    true

  • install_file

    Server-Host.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Async RAT payload 1 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.exe
    "C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:624
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5088
      • C:\Windows\system32\reg.exe
        reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
        3⤵
          PID:244
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2400
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:1564
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:224
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2412
        • C:\Windows\system32\reg.exe
          reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
          3⤵
          • Modifies Windows Defender Real-time Protection settings
          PID:2700
      • C:\Windows\SYSTEM32\cmd.exe
        "cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Windows\system32\reg.exe
          reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f
          3⤵
            PID:2320
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:808
          • C:\Windows\system32\reg.exe
            reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f
            3⤵
              PID:4596
          • C:\Windows\SYSTEM32\cmd.exe
            "cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableSettingsPage /t REG_DWORD /d 1 /f
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:336
            • C:\Windows\system32\reg.exe
              reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableSettingsPage /t REG_DWORD /d 1 /f
              3⤵
                PID:2060
            • C:\Users\Admin\AppData\Roaming\Main.exe
              "C:\Users\Admin\AppData\Roaming\Main.exe"
              2⤵
              • Checks computer location settings
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2300
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"' & exit
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:1144
                • C:\Windows\SysWOW64\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"'
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Scheduled Task/Job: Scheduled Task
                  PID:3616
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD532.tmp.bat""
                3⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4056
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 3
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Delays execution with timeout.exe
                  PID:2176
                • C:\Users\Admin\AppData\Roaming\Server-Host.exe
                  "C:\Users\Admin\AppData\Roaming\Server-Host.exe"
                  4⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2888

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmpD532.tmp.bat

            Filesize

            155B

            MD5

            92e3e000af7540350c6a7811ac6af397

            SHA1

            7d5fd2eab804e0a50ec0cd4d09af0dd528839621

            SHA256

            37846369d2320d6b6d6791b4da44df7a791520d74fdd7a777667cabe7517f657

            SHA512

            032fe288f27527bfdf8448d827f6fbe59b13707022d365d01b43f1dec04f80c6ae67da42f2192f860fa487be8754a0bbd4df1dd6b5a34304fe183e926e80c176

          • C:\Users\Admin\AppData\Roaming\Main.exe

            Filesize

            45KB

            MD5

            0f403599792ecdd23aa6834cb51f509e

            SHA1

            bcc135a6107eef55ebc89544cf584ea700f914dc

            SHA256

            be351f8d13bd9e018a7df090bfe4e4ed4b4976ab65e0c36eea3f83ac5e475f0f

            SHA512

            88cec361ff710ce74a1d6bf773984f8a57dfd117ebda48533f8f0394692576c16b0797a06766a5ec67f2ed8dc45632e2c181ad572f3c98ccdff786ba2fb63231

          • memory/2300-4-0x0000000000BC0000-0x0000000000BD2000-memory.dmp

            Filesize

            72KB

          • memory/2300-5-0x0000000005580000-0x000000000561C000-memory.dmp

            Filesize

            624KB

          • memory/2888-14-0x0000000005C20000-0x00000000061C4000-memory.dmp

            Filesize

            5.6MB

          • memory/2888-15-0x0000000005340000-0x00000000053A6000-memory.dmp

            Filesize

            408KB