Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 01:18
Behavioral task
behavioral1
Sample
3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe
Resource
win7-20240729-en
General
-
Target
3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe
-
Size
204KB
-
MD5
dfcfcd78d212140c3b087d315d5ed33b
-
SHA1
a3a5f02aa532c70f3452763ed6fbdfa03a7fac44
-
SHA256
3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc
-
SHA512
8dd40a9d957745926f519f97a03a5727f79f120477aa624e7f8f48d6b5275f6b45df4ee998868dd4ff738f9851a0aac32df13b1674ca528cdf5fefc731ed4da7
-
SSDEEP
3072:dURcxswS6PMVSsl3H1bNSGQNWwfBtOEp7ybMj/0vU7yZED+CDgbB+Y:d3S6PMVNVbR0W6mEpmbMjgU7yZf8
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
server.underground-cheat.xyz
-
delay
1
-
install
true
-
install_file
WinUpdate.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x003200000001930d-16.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2764 WinUpdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2108 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2748 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe 2764 WinUpdate.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe Token: SeDebugPrivilege 2764 WinUpdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2764 WinUpdate.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2244 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 29 PID 2544 wrote to memory of 2244 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 29 PID 2544 wrote to memory of 2244 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 29 PID 2544 wrote to memory of 2188 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 30 PID 2544 wrote to memory of 2188 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 30 PID 2544 wrote to memory of 2188 2544 3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe 30 PID 2188 wrote to memory of 2108 2188 cmd.exe 33 PID 2188 wrote to memory of 2108 2188 cmd.exe 33 PID 2188 wrote to memory of 2108 2188 cmd.exe 33 PID 2244 wrote to memory of 2748 2244 cmd.exe 34 PID 2244 wrote to memory of 2748 2244 cmd.exe 34 PID 2244 wrote to memory of 2748 2244 cmd.exe 34 PID 2188 wrote to memory of 2764 2188 cmd.exe 35 PID 2188 wrote to memory of 2764 2188 cmd.exe 35 PID 2188 wrote to memory of 2764 2188 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe"C:\Users\Admin\AppData\Local\Temp\3b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "WinUpdate" /tr '"C:\Users\Admin\AppData\Roaming\WinUpdate.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "WinUpdate" /tr '"C:\Users\Admin\AppData\Roaming\WinUpdate.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2748
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE734.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2108
-
-
C:\Users\Admin\AppData\Roaming\WinUpdate.exe"C:\Users\Admin\AppData\Roaming\WinUpdate.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153B
MD51197efc3ec56a87263a93c20e92eaa20
SHA1775aec0a069b55356b6a6e2d1e15f33a19c15939
SHA2560a40ae4f047409a69f5becee480838826018db73bccfddd1c036712d66b6aa6d
SHA512e7db749bf5f9c4bef4dd43654c03eaf4e1782a277e2d8aec6a9dec3c965a23341adeb7e7d4ad1c605af0dd65dd13089c4fd2a7d16930e2af2967a97dd034267f
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b
-
Filesize
204KB
MD5dfcfcd78d212140c3b087d315d5ed33b
SHA1a3a5f02aa532c70f3452763ed6fbdfa03a7fac44
SHA2563b03a24bfde864b0d8b17213f7f2deb6d7e3f5f74b34d3b601cbadd961b904fc
SHA5128dd40a9d957745926f519f97a03a5727f79f120477aa624e7f8f48d6b5275f6b45df4ee998868dd4ff738f9851a0aac32df13b1674ca528cdf5fefc731ed4da7