Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe
Resource
win7-20240729-en
General
-
Target
2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe
-
Size
589KB
-
MD5
d53fc47751fa8ad0b613c489aa779bda
-
SHA1
ec14fabb10b9aa9f05344c03802294e114bb2af1
-
SHA256
2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea
-
SHA512
b6441aeff786d23401267f23960410614a2686e3d10b6f58c5e9042d7c2f48a4975383f2ec05cfc801faa39a3bbb6bb58161b5ec248252c89ab9bf6ef382e326
-
SSDEEP
12288:ToQyRAMIgF72A0ybuxRN750J4iWoM7+EgLHpP3V5Ua:uHIgF7Wybexo4iWoM7oHpP3TR
Malware Config
Extracted
asyncrat
0.5.8
REED
bmh-global.myfirewall.org:15153
2bL4M7bieVyn
-
delay
10
-
install
true
-
install_file
windows manger.exe
-
install_folder
%Temp%
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe -
Executes dropped EXE 3 IoCs
pid Process 4900 windows manger.exe 3488 windows manger.exe 3432 windows manger.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 336 set thread context of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 4900 set thread context of 3432 4900 windows manger.exe 108 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows manger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows manger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4788 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5056 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 4900 windows manger.exe 4900 windows manger.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe Token: SeDebugPrivilege 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe Token: SeDebugPrivilege 4900 windows manger.exe Token: SeDebugPrivilege 3432 windows manger.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 336 wrote to memory of 1660 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 94 PID 336 wrote to memory of 1660 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 94 PID 336 wrote to memory of 1660 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 94 PID 336 wrote to memory of 2652 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 95 PID 336 wrote to memory of 2652 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 95 PID 336 wrote to memory of 2652 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 95 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 336 wrote to memory of 2888 336 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 96 PID 2888 wrote to memory of 1684 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 97 PID 2888 wrote to memory of 1684 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 97 PID 2888 wrote to memory of 1684 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 97 PID 2888 wrote to memory of 3040 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 99 PID 2888 wrote to memory of 3040 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 99 PID 2888 wrote to memory of 3040 2888 2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe 99 PID 1684 wrote to memory of 5056 1684 cmd.exe 101 PID 1684 wrote to memory of 5056 1684 cmd.exe 101 PID 1684 wrote to memory of 5056 1684 cmd.exe 101 PID 3040 wrote to memory of 4788 3040 cmd.exe 102 PID 3040 wrote to memory of 4788 3040 cmd.exe 102 PID 3040 wrote to memory of 4788 3040 cmd.exe 102 PID 3040 wrote to memory of 4900 3040 cmd.exe 103 PID 3040 wrote to memory of 4900 3040 cmd.exe 103 PID 3040 wrote to memory of 4900 3040 cmd.exe 103 PID 4900 wrote to memory of 3488 4900 windows manger.exe 107 PID 4900 wrote to memory of 3488 4900 windows manger.exe 107 PID 4900 wrote to memory of 3488 4900 windows manger.exe 107 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108 PID 4900 wrote to memory of 3432 4900 windows manger.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"2⤵PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"2⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"C:\Users\Admin\AppData\Local\Temp\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "windows manger" /tr '"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "windows manger" /tr '"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpE407.tmp.bat""3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4788
-
-
C:\Users\Admin\AppData\Local\Temp\windows manger.exe"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\windows manger.exe"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"5⤵
- Executes dropped EXE
PID:3488
-
-
C:\Users\Admin\AppData\Local\Temp\windows manger.exe"C:\Users\Admin\AppData\Local\Temp\windows manger.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\2328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea.exe.log
Filesize1KB
MD57cad59aef5a93f093b6ba494f13f796f
SHA13cef97b77939bfc06dfd3946fc1a8cd159f67100
SHA2561e1b444fe2d8772f6709b22b94bb5b0aa7fa590f6a693705d9bf1f2f71267a55
SHA5128cedd03efec34c6226a01fd6b4831a689be16545ea6b849cd96f775e0722bfefd4b47f3dd8401d2080d341d4319f75995ece60de44352a1f86a2e5dc01e6210b
-
Filesize
161B
MD55b8b38758be075c52bd98da4d481b730
SHA1c8ae71d05288e38cd9080434c3a97f5dd47c8a9c
SHA256fa6edb5ab8625cbc6291b2f2493eabcb02ed126b3aceddf1e8dda930c98b34b6
SHA5120df82ced167fd868b678233abf361e00f9cc35ab246b5ce551eec5266898aa965f4f71624768338fc65631c8bfecc4c0a72f4a5d7de6d2d837d24e08066c36c3
-
Filesize
589KB
MD5d53fc47751fa8ad0b613c489aa779bda
SHA1ec14fabb10b9aa9f05344c03802294e114bb2af1
SHA2562328201990de5c77c0353c61e628c68a01aaef1d4566ef9816a1f0333562c5ea
SHA512b6441aeff786d23401267f23960410614a2686e3d10b6f58c5e9042d7c2f48a4975383f2ec05cfc801faa39a3bbb6bb58161b5ec248252c89ab9bf6ef382e326