Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3RC7.zip
windows7-x64
1RC7.zip
windows10-2004-x64
1RC7 (5) (1...s.json
windows7-x64
3RC7 (5) (1...s.json
windows10-2004-x64
3RC7 (5) (1)/First.exe
windows7-x64
1RC7 (5) (1)/First.exe
windows10-2004-x64
1RC7 (5) (1)/First.exe
windows7-x64
1RC7 (5) (1)/First.exe
windows10-2004-x64
10RC7 (5) (1)/First.pdb
windows7-x64
3RC7 (5) (1)/First.pdb
windows10-2004-x64
3RC7 (5) (1...g.json
windows7-x64
3RC7 (5) (1...g.json
windows10-2004-x64
3RC7 (5) (1...ME.txt
windows7-x64
1RC7 (5) (1...ME.txt
windows10-2004-x64
1RC7 (5) (1...ET.dll
windows7-x64
1RC7 (5) (1...ET.dll
windows10-2004-x64
1Analysis
-
max time kernel
95s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/08/2024, 23:51
Static task
static1
Behavioral task
behavioral1
Sample
RC7.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
RC7.zip
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
RC7 (5) (1)/First.deps.json
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
RC7 (5) (1)/First.deps.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
RC7 (5) (1)/First.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
RC7 (5) (1)/First.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
RC7 (5) (1)/First.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
RC7 (5) (1)/First.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
RC7 (5) (1)/First.pdb
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
RC7 (5) (1)/First.pdb
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
RC7 (5) (1)/First.runtimeconfig.json
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
RC7 (5) (1)/First.runtimeconfig.json
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
RC7 (5) (1)/READ ME.txt
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
RC7 (5) (1)/READ ME.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
RC7 (5) (1)/ScintillaNET.dll
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
RC7 (5) (1)/ScintillaNET.dll
Resource
win10v2004-20240802-en
General
-
Target
RC7 (5) (1)/First.exe
-
Size
139KB
-
MD5
d5f71f93624190439b569498acca69a9
-
SHA1
323c616a5ed5e680b221f1db6acfa222e8be719a
-
SHA256
8bcb2329f01af33a1707f6a1a749987cfaff3976a9bcdbffad37d477dd5fd8ab
-
SHA512
e03043bbd4389f77d337a33d92764496bd5a84654a95a3792de0a025765d43a795ef1351a64d96c6ae1f85daadc68a1c1fdc192a9adb153a15cf1cb71607b715
-
SSDEEP
3072:+iS4omp03WQthI/9S3BZi08iRQ1G78IVn27bSfcJK8ltX:+iS4ompB9S3BZi0a1G78IVhcgct
Malware Config
Extracted
asyncrat
0.5.8
Default
45.90.13.137:7707
HleCBmrMxwFA
-
delay
3
-
install
true
-
install_file
Server-Host.exe
-
install_folder
%AppData%
Signatures
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" reg.exe -
Async RAT payload 1 IoCs
resource yara_rule behavioral8/files/0x00080000000234d5-2.dat family_asyncrat -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation Main.exe -
Executes dropped EXE 2 IoCs
pid Process 2300 Main.exe 2888 Server-Host.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server-Host.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2176 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3616 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe 2300 Main.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2300 Main.exe Token: SeDebugPrivilege 2888 Server-Host.exe Token: SeDebugPrivilege 2888 Server-Host.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 624 wrote to memory of 5088 624 First.exe 86 PID 624 wrote to memory of 5088 624 First.exe 86 PID 5088 wrote to memory of 244 5088 cmd.exe 89 PID 5088 wrote to memory of 244 5088 cmd.exe 89 PID 624 wrote to memory of 2400 624 First.exe 90 PID 624 wrote to memory of 2400 624 First.exe 90 PID 2400 wrote to memory of 1564 2400 cmd.exe 92 PID 2400 wrote to memory of 1564 2400 cmd.exe 92 PID 624 wrote to memory of 2032 624 First.exe 93 PID 624 wrote to memory of 2032 624 First.exe 93 PID 2032 wrote to memory of 224 2032 cmd.exe 95 PID 2032 wrote to memory of 224 2032 cmd.exe 95 PID 624 wrote to memory of 2412 624 First.exe 96 PID 624 wrote to memory of 2412 624 First.exe 96 PID 2412 wrote to memory of 2700 2412 cmd.exe 98 PID 2412 wrote to memory of 2700 2412 cmd.exe 98 PID 624 wrote to memory of 2800 624 First.exe 99 PID 624 wrote to memory of 2800 624 First.exe 99 PID 2800 wrote to memory of 2320 2800 cmd.exe 101 PID 2800 wrote to memory of 2320 2800 cmd.exe 101 PID 624 wrote to memory of 808 624 First.exe 102 PID 624 wrote to memory of 808 624 First.exe 102 PID 808 wrote to memory of 4596 808 cmd.exe 104 PID 808 wrote to memory of 4596 808 cmd.exe 104 PID 624 wrote to memory of 336 624 First.exe 105 PID 624 wrote to memory of 336 624 First.exe 105 PID 336 wrote to memory of 2060 336 cmd.exe 107 PID 336 wrote to memory of 2060 336 cmd.exe 107 PID 624 wrote to memory of 2300 624 First.exe 108 PID 624 wrote to memory of 2300 624 First.exe 108 PID 624 wrote to memory of 2300 624 First.exe 108 PID 2300 wrote to memory of 1144 2300 Main.exe 109 PID 2300 wrote to memory of 1144 2300 Main.exe 109 PID 2300 wrote to memory of 1144 2300 Main.exe 109 PID 2300 wrote to memory of 4056 2300 Main.exe 111 PID 2300 wrote to memory of 4056 2300 Main.exe 111 PID 2300 wrote to memory of 4056 2300 Main.exe 111 PID 1144 wrote to memory of 3616 1144 cmd.exe 113 PID 1144 wrote to memory of 3616 1144 cmd.exe 113 PID 1144 wrote to memory of 3616 1144 cmd.exe 113 PID 4056 wrote to memory of 2176 4056 cmd.exe 114 PID 4056 wrote to memory of 2176 4056 cmd.exe 114 PID 4056 wrote to memory of 2176 4056 cmd.exe 114 PID 4056 wrote to memory of 2888 4056 cmd.exe 115 PID 4056 wrote to memory of 2888 4056 cmd.exe 115 PID 4056 wrote to memory of 2888 4056 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.exe"C:\Users\Admin\AppData\Local\Temp\RC7 (5) (1)\First.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f3⤵PID:244
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:1564
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:224
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\reg.exereg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f3⤵
- Modifies Windows Defender Real-time Protection settings
PID:2700
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\system32\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableTaskMgr /t REG_DWORD /d 1 /f3⤵PID:2320
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoControlPanel /t REG_DWORD /d 1 /f3⤵PID:4596
-
-
-
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableSettingsPage /t REG_DWORD /d 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableSettingsPage /t REG_DWORD /d 1 /f3⤵PID:2060
-
-
-
C:\Users\Admin\AppData\Roaming\Main.exe"C:\Users\Admin\AppData\Roaming\Main.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Server-Host" /tr '"C:\Users\Admin\AppData\Roaming\Server-Host.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3616
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpD532.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2176
-
-
C:\Users\Admin\AppData\Roaming\Server-Host.exe"C:\Users\Admin\AppData\Roaming\Server-Host.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
155B
MD592e3e000af7540350c6a7811ac6af397
SHA17d5fd2eab804e0a50ec0cd4d09af0dd528839621
SHA25637846369d2320d6b6d6791b4da44df7a791520d74fdd7a777667cabe7517f657
SHA512032fe288f27527bfdf8448d827f6fbe59b13707022d365d01b43f1dec04f80c6ae67da42f2192f860fa487be8754a0bbd4df1dd6b5a34304fe183e926e80c176
-
Filesize
45KB
MD50f403599792ecdd23aa6834cb51f509e
SHA1bcc135a6107eef55ebc89544cf584ea700f914dc
SHA256be351f8d13bd9e018a7df090bfe4e4ed4b4976ab65e0c36eea3f83ac5e475f0f
SHA51288cec361ff710ce74a1d6bf773984f8a57dfd117ebda48533f8f0394692576c16b0797a06766a5ec67f2ed8dc45632e2c181ad572f3c98ccdff786ba2fb63231