Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
18/08/2024, 18:44
Behavioral task
behavioral1
Sample
557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe
Resource
win7-20240704-en
5 signatures
150 seconds
General
-
Target
557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe
-
Size
101KB
-
MD5
16e4639eec14e7d2c92ba2c7f137e8e9
-
SHA1
389cf8b3b34b45404e6b8942b6ab4bc0026854b8
-
SHA256
557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079
-
SHA512
0aa6f9ca46b046037fb3277cba0a0487524f8b9c25562f9742fcd25f3931057352e971caa0b1a4a7e1787f38ef45c4d72f0e3d01b9c0e7dcdb773217a6880784
-
SSDEEP
3072:iUhcxNQ5bPMVme9VdQsH1bfoAQjl9m0EARiBY:io5bPMVmaesVbQAv0Zw
Malware Config
Extracted
Family
asyncrat
Botnet
Default
C2
192.151.243.230:5629
192.151.243.230:54612
Mutex
vrhlsemyjf
Attributes
-
delay
1
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
resource yara_rule behavioral1/memory/2448-1-0x0000000000D90000-0x0000000000DAE000-memory.dmp VenomRAT -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2448 557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe"C:\Users\Admin\AppData\Local\Temp\557546923cb7c11be5b3be3449b20e05db90caeb4db1ec121cd91bcc1d45a079.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2448