Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 08:34
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240802-en
General
-
Target
Client.exe
-
Size
63KB
-
MD5
a8515eaaad39b50757b65dacd5c17042
-
SHA1
98bf1b3765448f24447bdcd4117e972fae8fe09e
-
SHA256
f22ec9c2df8efd42827f0c23c3a47c5cd776e2213cad5f1e067c4f2e4ac0cebe
-
SHA512
d35bc0179ef0a94fbe579fc4c2991a5a8e720eea2fc70d50a731d37b3934bc90214239339840fcfd82553d08ba54d22dc56d182902cead6d8a2692065a3cd667
-
SSDEEP
1536:QhW5hc1kw0kV7eeiIVrGbbXw5o6zUKGODpqKmY7:QhW5hc1kWVieXGbbX76w0gz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
software-julia.gl.at.ply.gg:17106
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00070000000120f9-15.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2804 Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 2240 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2260 Client.exe 2260 Client.exe 2260 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2260 Client.exe Token: SeDebugPrivilege 2804 Windows.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2968 2260 Client.exe 30 PID 2260 wrote to memory of 2968 2260 Client.exe 30 PID 2260 wrote to memory of 2968 2260 Client.exe 30 PID 2260 wrote to memory of 2704 2260 Client.exe 32 PID 2260 wrote to memory of 2704 2260 Client.exe 32 PID 2260 wrote to memory of 2704 2260 Client.exe 32 PID 2968 wrote to memory of 2300 2968 cmd.exe 33 PID 2968 wrote to memory of 2300 2968 cmd.exe 33 PID 2968 wrote to memory of 2300 2968 cmd.exe 33 PID 2704 wrote to memory of 2240 2704 cmd.exe 35 PID 2704 wrote to memory of 2240 2704 cmd.exe 35 PID 2704 wrote to memory of 2240 2704 cmd.exe 35 PID 2704 wrote to memory of 2804 2704 cmd.exe 36 PID 2704 wrote to memory of 2804 2704 cmd.exe 36 PID 2704 wrote to memory of 2804 2704 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:2300
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp4F77.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:2240
-
-
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5b8713d6c3a91a227e4a310fced5715ca
SHA1cfc0165c1d4a5b56dd9884d1cb25eb1d2c3cebc4
SHA2564cc57ab237c87b71081fbbcd8dc5aedf4f88cbdeba5c4f85b16c06512a05e732
SHA512bf0e0501a69af8fcb3e570b6704afa4e3a0e9af2c5b8987b7937862dbcd0f6a922244e8c66fd3d1e338ac706005056493b1771108d65955bb00d5bfa60bc079b
-
Filesize
63KB
MD5a8515eaaad39b50757b65dacd5c17042
SHA198bf1b3765448f24447bdcd4117e972fae8fe09e
SHA256f22ec9c2df8efd42827f0c23c3a47c5cd776e2213cad5f1e067c4f2e4ac0cebe
SHA512d35bc0179ef0a94fbe579fc4c2991a5a8e720eea2fc70d50a731d37b3934bc90214239339840fcfd82553d08ba54d22dc56d182902cead6d8a2692065a3cd667