Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 08:34
Behavioral task
behavioral1
Sample
Client.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Client.exe
Resource
win10v2004-20240802-en
General
-
Target
Client.exe
-
Size
63KB
-
MD5
a8515eaaad39b50757b65dacd5c17042
-
SHA1
98bf1b3765448f24447bdcd4117e972fae8fe09e
-
SHA256
f22ec9c2df8efd42827f0c23c3a47c5cd776e2213cad5f1e067c4f2e4ac0cebe
-
SHA512
d35bc0179ef0a94fbe579fc4c2991a5a8e720eea2fc70d50a731d37b3934bc90214239339840fcfd82553d08ba54d22dc56d182902cead6d8a2692065a3cd667
-
SSDEEP
1536:QhW5hc1kw0kV7eeiIVrGbbXw5o6zUKGODpqKmY7:QhW5hc1kWVieXGbbX76w0gz
Malware Config
Extracted
asyncrat
5.0.5
Venom Clients
software-julia.gl.at.ply.gg:17106
Venom_RAT_HVNC_Mutex_Venom RAT_HVNC
-
delay
1
-
install
true
-
install_file
Windows.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000400000001d9ff-10.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation Client.exe -
Executes dropped EXE 1 IoCs
pid Process 1872 Windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3956 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe 3520 Client.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3520 Client.exe Token: SeDebugPrivilege 1872 Windows.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3520 wrote to memory of 1192 3520 Client.exe 87 PID 3520 wrote to memory of 1192 3520 Client.exe 87 PID 3520 wrote to memory of 3432 3520 Client.exe 89 PID 3520 wrote to memory of 3432 3520 Client.exe 89 PID 1192 wrote to memory of 1320 1192 cmd.exe 91 PID 1192 wrote to memory of 1320 1192 cmd.exe 91 PID 3432 wrote to memory of 3956 3432 cmd.exe 92 PID 3432 wrote to memory of 3956 3432 cmd.exe 92 PID 3432 wrote to memory of 1872 3432 cmd.exe 97 PID 3432 wrote to memory of 1872 3432 cmd.exe 97 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Windows" /tr '"C:\Users\Admin\AppData\Roaming\Windows.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:1320
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp9E63.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3956
-
-
C:\Users\Admin\AppData\Roaming\Windows.exe"C:\Users\Admin\AppData\Roaming\Windows.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD5e512f108ded777a61c30f29fbd426a79
SHA186ccff47529b2123b08aa3ccd10f8a450faf398f
SHA256592f6fe8f63031b665dcdf7ac138e408d130dd76ef7bb421274a4fc0ded7c5cc
SHA5121a0ee1f810c6e896435dcf48c15babf39081bf1a007029adc3247cb2af46da1ea3724c95a0856591125405c89aa224b8dea1e9a4e31352f84143687e43a5ec26
-
Filesize
63KB
MD5a8515eaaad39b50757b65dacd5c17042
SHA198bf1b3765448f24447bdcd4117e972fae8fe09e
SHA256f22ec9c2df8efd42827f0c23c3a47c5cd776e2213cad5f1e067c4f2e4ac0cebe
SHA512d35bc0179ef0a94fbe579fc4c2991a5a8e720eea2fc70d50a731d37b3934bc90214239339840fcfd82553d08ba54d22dc56d182902cead6d8a2692065a3cd667