Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
137s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 01:30
Behavioral task
behavioral1
Sample
7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe
Resource
win7-20240708-en
General
-
Target
7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe
-
Size
64KB
-
MD5
919b43661894503a00d44ffd1174d613
-
SHA1
c510009fb7bad735e35a10c0ebe925d730ca961f
-
SHA256
7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca
-
SHA512
5019e86e2c0585aa59d7c14b4a0b03c911440487b9bd843db0a6138861e46274f17d72deea09429b650c5976aa9bf03d7427d65b26cc4b65c0c0bd9f1b19997b
-
SSDEEP
768:N9aGzWs/9PiPJ5eit9JSTLavfU4OnsD3q66T1+4SCv7mqb2nRpwH1oDjoUhPGnPP:vaW90TekUJyq6OqGbbUwDuGnPpqKmY7
Malware Config
Extracted
asyncrat
5.0.5
server.underground-cheat.xyz:4449
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
Host Process for Windows.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000600000001da3a-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe -
Executes dropped EXE 1 IoCs
pid Process 2016 Host Process for Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3120 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe Token: SeDebugPrivilege 2016 Host Process for Windows.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2104 wrote to memory of 3880 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 86 PID 2104 wrote to memory of 3880 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 86 PID 2104 wrote to memory of 3356 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 88 PID 2104 wrote to memory of 3356 2104 7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe 88 PID 3356 wrote to memory of 3120 3356 cmd.exe 90 PID 3356 wrote to memory of 3120 3356 cmd.exe 90 PID 3880 wrote to memory of 4420 3880 cmd.exe 91 PID 3880 wrote to memory of 4420 3880 cmd.exe 91 PID 3356 wrote to memory of 2016 3356 cmd.exe 92 PID 3356 wrote to memory of 2016 3356 cmd.exe 92 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe"C:\Users\Admin\AppData\Local\Temp\7ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Host Process for Windows" /tr '"C:\Users\Admin\AppData\Roaming\Host Process for Windows.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Host Process for Windows" /tr '"C:\Users\Admin\AppData\Roaming\Host Process for Windows.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4420
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp6590.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3120
-
-
C:\Users\Admin\AppData\Roaming\Host Process for Windows.exe"C:\Users\Admin\AppData\Roaming\Host Process for Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD59a3f5839c4456f5f85b01e3f44872a6e
SHA18c9211493512689a5c9ec2508b50eb7224267d53
SHA256f1112557678c099a4af34be3df4a166cc32189ebec961a06a6c152b9d4277ea8
SHA5123b60669e32649581dd959198dc24330392bddeff0ed0b711ad661e1052a48b556f1c4f6113150a38d0277e3401199de36149ec880e302f1acbf2906a31cf7940
-
Filesize
64KB
MD5919b43661894503a00d44ffd1174d613
SHA1c510009fb7bad735e35a10c0ebe925d730ca961f
SHA2567ce2d225442252064d744be1c38e9c1572dd355bbbaf7fa411ce79e41288dfca
SHA5125019e86e2c0585aa59d7c14b4a0b03c911440487b9bd843db0a6138861e46274f17d72deea09429b650c5976aa9bf03d7427d65b26cc4b65c0c0bd9f1b19997b