Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 18:17
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win7-20240708-en
General
-
Target
AsyncClient.exe
-
Size
59KB
-
MD5
7ffbcac612bf8f2c14d872af7e7c68a0
-
SHA1
46f7f128b782946f0ad74ed4a278a4c266e3ed5d
-
SHA256
5cd5530ea7aea507cb7faf6f9049448252aebd2cd4a4ecd7f040a1c44274dbaf
-
SHA512
4428df372dc50d285630883afec00fb375245ea52b36db976eadc513669d438e4eb398153e5f1317db8c92fd59cc418cafedc57db97b52b23190a11c0e4d71ad
-
SSDEEP
1536:8uk7VT0M912CVcPpD4zbkhc+eaT9VCbAHdMn25FyX/oah:8ukJT0ML2YcPizbk/998CK2P6/oah
Malware Config
Extracted
asyncrat
0.5.8
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
127.0.0.1:2020
oOcKCLkOWt6j
-
delay
3
-
install
true
-
install_file
Roblox.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023410-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation AsyncClient.exe -
Executes dropped EXE 1 IoCs
pid Process 4460 Roblox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Roblox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3016 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1840 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe 2444 AsyncClient.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 AsyncClient.exe Token: SeDebugPrivilege 4460 Roblox.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2444 wrote to memory of 5016 2444 AsyncClient.exe 92 PID 2444 wrote to memory of 5016 2444 AsyncClient.exe 92 PID 2444 wrote to memory of 5016 2444 AsyncClient.exe 92 PID 2444 wrote to memory of 3296 2444 AsyncClient.exe 94 PID 2444 wrote to memory of 3296 2444 AsyncClient.exe 94 PID 2444 wrote to memory of 3296 2444 AsyncClient.exe 94 PID 5016 wrote to memory of 1840 5016 cmd.exe 96 PID 5016 wrote to memory of 1840 5016 cmd.exe 96 PID 5016 wrote to memory of 1840 5016 cmd.exe 96 PID 3296 wrote to memory of 3016 3296 cmd.exe 97 PID 3296 wrote to memory of 3016 3296 cmd.exe 97 PID 3296 wrote to memory of 3016 3296 cmd.exe 97 PID 3296 wrote to memory of 4460 3296 cmd.exe 99 PID 3296 wrote to memory of 4460 3296 cmd.exe 99 PID 3296 wrote to memory of 4460 3296 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Roblox" /tr '"C:\Users\Admin\AppData\Roaming\Roblox.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Roblox" /tr '"C:\Users\Admin\AppData\Roaming\Roblox.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpA577.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3016
-
-
C:\Users\Admin\AppData\Roaming\Roblox.exe"C:\Users\Admin\AppData\Roaming\Roblox.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4460
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD56bc7fe48c79b7b41aec959286fd819cc
SHA179e02b52a160d1e4cb3a62189c4ab5906d05bae6
SHA25621954d85b9db6aa3a3024f9951360c2778b7cabbf57937daec320c17e9db44e0
SHA5125d7fcd1fda3545c2d4507197e2124ac661a3aa88c73a57662d8f4f9858669525e73fd9c42c754dab5079b3f841fe944bcabc2fa21ac56b460045ea3a206cc1d2
-
Filesize
59KB
MD57ffbcac612bf8f2c14d872af7e7c68a0
SHA146f7f128b782946f0ad74ed4a278a4c266e3ed5d
SHA2565cd5530ea7aea507cb7faf6f9049448252aebd2cd4a4ecd7f040a1c44274dbaf
SHA5124428df372dc50d285630883afec00fb375245ea52b36db976eadc513669d438e4eb398153e5f1317db8c92fd59cc418cafedc57db97b52b23190a11c0e4d71ad