Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 09:04
Behavioral task
behavioral1
Sample
rat.exe
Resource
win7-20240704-en
General
-
Target
rat.exe
-
Size
48KB
-
MD5
fcf89ebf3f7353591c0784c354fb1ff0
-
SHA1
a4df86134af908d17c434fbfcdbe8452df1e0839
-
SHA256
2acf58b89e013558f70f7d432331cb926ea74093b1a0f7ff753779dd5aca45bb
-
SHA512
a974178f767d25958ed684997f12be01d3b536cb5ea07eb2380bec3e9b9dddf2a2db7183c665a5ca5402220bff4e301eb8f9448b8d83ae514af3efbd9987b76c
-
SSDEEP
768:Jok4oILg+k5+biSP/DaGTyiMb8YbegeiAA0FvvEgK/JCVVc6KN:JokXRomGwzbhPB01nkJCVVclN
Malware Config
Extracted
asyncrat
1.0.7
Solara
legacysoud.duckdns.org:8848
-
delay
1
-
install
true
-
install_file
bfsvc.exe
-
install_folder
%Temp%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0026000000018f84-14.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2812 bfsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3056 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2784 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2084 rat.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2084 rat.exe Token: SeDebugPrivilege 2812 bfsvc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2468 2084 rat.exe 29 PID 2084 wrote to memory of 2468 2084 rat.exe 29 PID 2084 wrote to memory of 2468 2084 rat.exe 29 PID 2084 wrote to memory of 2780 2084 rat.exe 31 PID 2084 wrote to memory of 2780 2084 rat.exe 31 PID 2084 wrote to memory of 2780 2084 rat.exe 31 PID 2780 wrote to memory of 3056 2780 cmd.exe 33 PID 2780 wrote to memory of 3056 2780 cmd.exe 33 PID 2780 wrote to memory of 3056 2780 cmd.exe 33 PID 2468 wrote to memory of 2784 2468 cmd.exe 34 PID 2468 wrote to memory of 2784 2468 cmd.exe 34 PID 2468 wrote to memory of 2784 2468 cmd.exe 34 PID 2780 wrote to memory of 2812 2780 cmd.exe 35 PID 2780 wrote to memory of 2812 2780 cmd.exe 35 PID 2780 wrote to memory of 2812 2780 cmd.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\rat.exe"C:\Users\Admin\AppData\Local\Temp\rat.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "bfsvc" /tr '"C:\Users\Admin\AppData\Local\Temp\bfsvc.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "bfsvc" /tr '"C:\Users\Admin\AppData\Local\Temp\bfsvc.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2784
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp279D.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\bfsvc.exe"C:\Users\Admin\AppData\Local\Temp\bfsvc.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD5fcf89ebf3f7353591c0784c354fb1ff0
SHA1a4df86134af908d17c434fbfcdbe8452df1e0839
SHA2562acf58b89e013558f70f7d432331cb926ea74093b1a0f7ff753779dd5aca45bb
SHA512a974178f767d25958ed684997f12be01d3b536cb5ea07eb2380bec3e9b9dddf2a2db7183c665a5ca5402220bff4e301eb8f9448b8d83ae514af3efbd9987b76c
-
Filesize
152B
MD590274e98a6f9ede670d7ff512b6e1c52
SHA11b992c90bc82f95297775f3be8a55dff06b0bc68
SHA2561420f694748253185ae8a960f02a81a07c6ca08f8d5196b7b43a108942a870ad
SHA51276e7f929ad892ac8176f962d9b9fab638fab595fb088bbc04823f1a4688a4df1ca3ef3d9e1c14f17caeda51e2c18a216f7e1af3347cf0dcb7508add0e438f889