Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 04:18
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240708-en
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
26e9b2f985b2680cf1a1881bd5e23b4e
-
SHA1
8af6aa09c15ac2947666a6f8778f75da4bfbcb1c
-
SHA256
de3e68021cc2c807e4c0297ab277396acd8a8939031bab33a7b72323b90f3f81
-
SHA512
964803e4a82111ee7fd3648b9fc1d3d3260a43f2282d27ed4789f90060a8f240bece4712ee9c74004a5b7b1bd91fbce90c13709269d3e07b27c360e039aef7da
-
SSDEEP
768:KuETKT0k3qXWUrV6e1mo2qyIQKjPGaG6PIyzjbFgX3ilHt7MPbCiMGYkZaOwpo4+:KuETKT0cE2/1KTkDy3bCXSRt7AmGYmau
Malware Config
Extracted
asyncrat
0.5.8
realxworm
147.185.221.20:9835
147.185.221.20:18563
eCCoCTFPGVfF
-
delay
3
-
install
true
-
install_file
ToiletRizz.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0009000000012286-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2848 ToiletRizz.exe -
Loads dropped DLL 1 IoCs
pid Process 2736 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ToiletRizz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2792 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2824 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2964 AsyncClient.exe 2964 AsyncClient.exe 2964 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2964 AsyncClient.exe Token: SeDebugPrivilege 2848 ToiletRizz.exe Token: SeDebugPrivilege 2848 ToiletRizz.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2964 wrote to memory of 2904 2964 AsyncClient.exe 31 PID 2964 wrote to memory of 2904 2964 AsyncClient.exe 31 PID 2964 wrote to memory of 2904 2964 AsyncClient.exe 31 PID 2964 wrote to memory of 2904 2964 AsyncClient.exe 31 PID 2964 wrote to memory of 2736 2964 AsyncClient.exe 33 PID 2964 wrote to memory of 2736 2964 AsyncClient.exe 33 PID 2964 wrote to memory of 2736 2964 AsyncClient.exe 33 PID 2964 wrote to memory of 2736 2964 AsyncClient.exe 33 PID 2904 wrote to memory of 2824 2904 cmd.exe 35 PID 2904 wrote to memory of 2824 2904 cmd.exe 35 PID 2904 wrote to memory of 2824 2904 cmd.exe 35 PID 2904 wrote to memory of 2824 2904 cmd.exe 35 PID 2736 wrote to memory of 2792 2736 cmd.exe 36 PID 2736 wrote to memory of 2792 2736 cmd.exe 36 PID 2736 wrote to memory of 2792 2736 cmd.exe 36 PID 2736 wrote to memory of 2792 2736 cmd.exe 36 PID 2736 wrote to memory of 2848 2736 cmd.exe 37 PID 2736 wrote to memory of 2848 2736 cmd.exe 37 PID 2736 wrote to memory of 2848 2736 cmd.exe 37 PID 2736 wrote to memory of 2848 2736 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ToiletRizz" /tr '"C:\Users\Admin\AppData\Roaming\ToiletRizz.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "ToiletRizz" /tr '"C:\Users\Admin\AppData\Roaming\ToiletRizz.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpB08A.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\ToiletRizz.exe"C:\Users\Admin\AppData\Roaming\ToiletRizz.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
154B
MD59b4c8955eb5fa8f5b422913309078013
SHA1e86c07b72521386f2ab20df38df73587ce1c162d
SHA2563d20903828b1eb0b83750dee9ffda1ad61a8beb30f44dea583cb93c8b15bfbe5
SHA512a7c3ee1538bba4f191fb74c8149b0fdea3dcc0d63a45ac9a89dc5384977ce57dc03bb4f4d43f4025f4523df2f357c6c0a950c1919c5e84929b970382c0649463
-
Filesize
45KB
MD526e9b2f985b2680cf1a1881bd5e23b4e
SHA18af6aa09c15ac2947666a6f8778f75da4bfbcb1c
SHA256de3e68021cc2c807e4c0297ab277396acd8a8939031bab33a7b72323b90f3f81
SHA512964803e4a82111ee7fd3648b9fc1d3d3260a43f2282d27ed4789f90060a8f240bece4712ee9c74004a5b7b1bd91fbce90c13709269d3e07b27c360e039aef7da