Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/08/2024, 11:16
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION No.2400228341.pdf.exe
Resource
win7-20240705-en
General
-
Target
QUOTATION No.2400228341.pdf.exe
-
Size
608KB
-
MD5
690c1b65a6267d6d0b201ba46089aabc
-
SHA1
9eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
-
SHA256
244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
-
SHA512
cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a
-
SSDEEP
12288:foQyRAt8qF72zz4a5wbpkTPVNI8mQdd1lzRB6nC8OziDjmRkR:qm8qF7Gzp5waTPVNuIdnYC8OyCM
Malware Config
Extracted
asyncrat
0.5.8
2 MONEY
twart.myfirewall.org:14143
udn3BZ1Fqt3jtiZx
-
delay
30
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Executes dropped EXE 9 IoCs
pid Process 1532 svchost.exe 1724 svchost.exe 1480 svchost.exe 2956 rnfvpf.exe 1652 rnfvpf.exe 880 rnfvpf.exe 1536 rnfvpf.exe 2908 rnfvpf.exe 2684 rnfvpf.exe -
Loads dropped DLL 11 IoCs
pid Process 3000 cmd.exe 3000 cmd.exe 1532 svchost.exe 1532 svchost.exe 1688 powershell.exe 1688 powershell.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
pid Process 1688 powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2500 set thread context of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 1532 set thread context of 1480 1532 svchost.exe 41 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rnfvpf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION No.2400228341.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION No.2400228341.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1864 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1448 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 3004 QUOTATION No.2400228341.pdf.exe 3004 QUOTATION No.2400228341.pdf.exe 3004 QUOTATION No.2400228341.pdf.exe 1532 svchost.exe 1532 svchost.exe 1688 powershell.exe 1688 powershell.exe 1688 powershell.exe 1480 svchost.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe 2956 rnfvpf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3004 QUOTATION No.2400228341.pdf.exe Token: SeDebugPrivilege 1532 svchost.exe Token: SeDebugPrivilege 1480 svchost.exe Token: SeDebugPrivilege 1688 powershell.exe Token: SeDebugPrivilege 2956 rnfvpf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 2500 wrote to memory of 3004 2500 QUOTATION No.2400228341.pdf.exe 31 PID 3004 wrote to memory of 2984 3004 QUOTATION No.2400228341.pdf.exe 33 PID 3004 wrote to memory of 2984 3004 QUOTATION No.2400228341.pdf.exe 33 PID 3004 wrote to memory of 2984 3004 QUOTATION No.2400228341.pdf.exe 33 PID 3004 wrote to memory of 2984 3004 QUOTATION No.2400228341.pdf.exe 33 PID 3004 wrote to memory of 3000 3004 QUOTATION No.2400228341.pdf.exe 35 PID 3004 wrote to memory of 3000 3004 QUOTATION No.2400228341.pdf.exe 35 PID 3004 wrote to memory of 3000 3004 QUOTATION No.2400228341.pdf.exe 35 PID 3004 wrote to memory of 3000 3004 QUOTATION No.2400228341.pdf.exe 35 PID 2984 wrote to memory of 1448 2984 cmd.exe 37 PID 2984 wrote to memory of 1448 2984 cmd.exe 37 PID 2984 wrote to memory of 1448 2984 cmd.exe 37 PID 2984 wrote to memory of 1448 2984 cmd.exe 37 PID 3000 wrote to memory of 1864 3000 cmd.exe 38 PID 3000 wrote to memory of 1864 3000 cmd.exe 38 PID 3000 wrote to memory of 1864 3000 cmd.exe 38 PID 3000 wrote to memory of 1864 3000 cmd.exe 38 PID 3000 wrote to memory of 1532 3000 cmd.exe 39 PID 3000 wrote to memory of 1532 3000 cmd.exe 39 PID 3000 wrote to memory of 1532 3000 cmd.exe 39 PID 3000 wrote to memory of 1532 3000 cmd.exe 39 PID 1532 wrote to memory of 1724 1532 svchost.exe 40 PID 1532 wrote to memory of 1724 1532 svchost.exe 40 PID 1532 wrote to memory of 1724 1532 svchost.exe 40 PID 1532 wrote to memory of 1724 1532 svchost.exe 40 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1532 wrote to memory of 1480 1532 svchost.exe 41 PID 1480 wrote to memory of 1296 1480 svchost.exe 42 PID 1480 wrote to memory of 1296 1480 svchost.exe 42 PID 1480 wrote to memory of 1296 1480 svchost.exe 42 PID 1480 wrote to memory of 1296 1480 svchost.exe 42 PID 1296 wrote to memory of 1688 1296 cmd.exe 44 PID 1296 wrote to memory of 1688 1296 cmd.exe 44 PID 1296 wrote to memory of 1688 1296 cmd.exe 44 PID 1296 wrote to memory of 1688 1296 cmd.exe 44 PID 1688 wrote to memory of 2956 1688 powershell.exe 45 PID 1688 wrote to memory of 2956 1688 powershell.exe 45 PID 1688 wrote to memory of 2956 1688 powershell.exe 45 PID 1688 wrote to memory of 2956 1688 powershell.exe 45 PID 2956 wrote to memory of 1652 2956 rnfvpf.exe 46 PID 2956 wrote to memory of 1652 2956 rnfvpf.exe 46 PID 2956 wrote to memory of 1652 2956 rnfvpf.exe 46 PID 2956 wrote to memory of 1652 2956 rnfvpf.exe 46 PID 2956 wrote to memory of 880 2956 rnfvpf.exe 47 PID 2956 wrote to memory of 880 2956 rnfvpf.exe 47 PID 2956 wrote to memory of 880 2956 rnfvpf.exe 47 PID 2956 wrote to memory of 880 2956 rnfvpf.exe 47 PID 2956 wrote to memory of 1536 2956 rnfvpf.exe 48 PID 2956 wrote to memory of 1536 2956 rnfvpf.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION No.2400228341.pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Local\Temp\svchost.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp6F37.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c start /b powershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"' & exit6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell –ExecutionPolicy Bypass Start-Process -FilePath '"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"'7⤵
- Loads dropped DLL
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"9⤵
- Executes dropped EXE
PID:1652
-
-
C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"9⤵
- Executes dropped EXE
PID:880
-
-
C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"9⤵
- Executes dropped EXE
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"9⤵
- Executes dropped EXE
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"C:\Users\Admin\AppData\Local\Temp\rnfvpf.exe"9⤵
- Executes dropped EXE
PID:2684
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
154B
MD5741df3ad19cf668fb795a70f6550e49f
SHA14c5db8b88a19377764d06a7f3627b634851ddd84
SHA2567a55feeccc51f2da4a7ee034b905683cc56ed38a20115b4ef3adf089bd798ca7
SHA512fa3bbfc66925f2a01d23ae9001199d07f1e8dc296bbd0c2df40119b9fae94a9f8dd531d7b8dce3c37024cdbe63adaadc896fc09a2472207550b729814636bac7
-
Filesize
787KB
MD565024845cc98cd27fe6fd1cde0b90e13
SHA1548a9f43848255a76b96d9617fce46216ce7cac2
SHA2563ea082cbf550dcc1c297441b6859a65c1a47587a9eec61121d6799984e679c2f
SHA512a41f91fdf28d3a46663a5ee29c2cff030876fbe458bb6f84c012fdc02641f5c21208beba17ff6e541ea48592ea53a7f4e62fe0f4de13442bf20c2ad1b4fa20a0
-
Filesize
608KB
MD5690c1b65a6267d6d0b201ba46089aabc
SHA19eb6859bae82bcf8b9df7cf4fc061cd9155fdc39
SHA256244f3a2fad1afa232909355901f33cca18ea95444c5d142c7aa308170db5294f
SHA512cc540851386a3b98227822b2c952a57caf15db4563f9c246b8be5bca0989aaff70e64191d010738db86598d76dd8ad4e59a50965224db9f623edb64f2f8b3e2a