Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 04:24
Behavioral task
behavioral1
Sample
e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe
Resource
win7-20240705-en
General
-
Target
e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe
-
Size
45KB
-
MD5
d713ae5b9cff7387e5a9363046db5caa
-
SHA1
70b052a2e2994cb8579e75d97607c2ff7a1095f4
-
SHA256
e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e
-
SHA512
b4c9f1b780e39224928f023b80d03a117d6e19670b3615fad4d9d7269d9b1397ed15e54c437a0b203b436869350fa59577482f05bed9274677733aa690463be7
-
SSDEEP
768:yuETKT0k3qXWUrV6e1mo2qyI3XqJthIf33OPI8zjbugXvipn5Wz8e/zX5iBDZqx:yuETKT0cE2/AXw2v383bRXKpn5WVcdqx
Malware Config
Extracted
asyncrat
0.5.8
giampiero
194.55.186.129:5000
NBzTELYY8p2o
-
delay
3
-
install
true
-
install_file
$77svchost.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012281-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2844 $77svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2136 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language $77svchost.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2948 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2692 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe Token: SeDebugPrivilege 2844 $77svchost.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3056 wrote to memory of 2672 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 31 PID 3056 wrote to memory of 2672 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 31 PID 3056 wrote to memory of 2672 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 31 PID 3056 wrote to memory of 2672 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 31 PID 3056 wrote to memory of 2136 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 33 PID 3056 wrote to memory of 2136 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 33 PID 3056 wrote to memory of 2136 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 33 PID 3056 wrote to memory of 2136 3056 e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe 33 PID 2672 wrote to memory of 2692 2672 cmd.exe 35 PID 2672 wrote to memory of 2692 2672 cmd.exe 35 PID 2672 wrote to memory of 2692 2672 cmd.exe 35 PID 2672 wrote to memory of 2692 2672 cmd.exe 35 PID 2136 wrote to memory of 2948 2136 cmd.exe 36 PID 2136 wrote to memory of 2948 2136 cmd.exe 36 PID 2136 wrote to memory of 2948 2136 cmd.exe 36 PID 2136 wrote to memory of 2948 2136 cmd.exe 36 PID 2136 wrote to memory of 2844 2136 cmd.exe 37 PID 2136 wrote to memory of 2844 2136 cmd.exe 37 PID 2136 wrote to memory of 2844 2136 cmd.exe 37 PID 2136 wrote to memory of 2844 2136 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe"C:\Users\Admin\AppData\Local\Temp\e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "$77svchost" /tr '"C:\Users\Admin\AppData\Roaming\$77svchost.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "$77svchost" /tr '"C:\Users\Admin\AppData\Roaming\$77svchost.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE1D7.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2948
-
-
C:\Users\Admin\AppData\Roaming\$77svchost.exe"C:\Users\Admin\AppData\Roaming\$77svchost.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
154B
MD540cea7d2d59015adf712dc3c815e7afd
SHA17bfddd883e385ed4b09b7db256db5b29f5f242e0
SHA25640cec063b4436e481c3ad6952e09de070f2f8a5e77dffad0918f16d4b774e0d7
SHA51234e65233a19fc400153a4dc892253bb6fa615f3adbb76d9cef83fd34e5fef7eb9a7cc12d103ebf7aa30e108e8bb6e77db6477c12dff9aedac1eb4c4ebd2be0ca
-
Filesize
45KB
MD5d713ae5b9cff7387e5a9363046db5caa
SHA170b052a2e2994cb8579e75d97607c2ff7a1095f4
SHA256e24dd26925db61391a279370f6ee22e4d35ea0a13ca88ae7dae5a8def177832e
SHA512b4c9f1b780e39224928f023b80d03a117d6e19670b3615fad4d9d7269d9b1397ed15e54c437a0b203b436869350fa59577482f05bed9274677733aa690463be7