Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 14:59
Behavioral task
behavioral1
Sample
988b8d3ae9f2303ee25180c3aba36130N.exe
Resource
win7-20240704-en
General
-
Target
988b8d3ae9f2303ee25180c3aba36130N.exe
-
Size
60KB
-
MD5
988b8d3ae9f2303ee25180c3aba36130
-
SHA1
8b582769709c5c762740631a0aefc7f93f51c1c9
-
SHA256
6ffe8e2aa7ebc17267ea90ddc0449d4f60306befd644adb60a26cbf9690f8ec6
-
SHA512
21e11756a79b13fce2f5df5fca50ad18696fa6eba2b13245afef12d10cd9840761e0e4519e85cee5d5ac3fbac9c8b37aabec1e79e96a913277abc43ba1201832
-
SSDEEP
1536:lEKVoSSTTeBfSIUG+q25b4MwXVwcTXAFI1+:uKiiBqIUG+q25b4McTXAag
Malware Config
Extracted
asyncrat
SuperBoo Rat v1.1
Default
com-distinct.gl.at.ply.gg:26706
SuperBoo_mtex_920393
-
delay
3
-
install
true
-
install_file
ratted.exe
-
install_folder
%AppData%
Signatures
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000a00000002338a-12.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 988b8d3ae9f2303ee25180c3aba36130N.exe -
Executes dropped EXE 1 IoCs
pid Process 3456 ratted.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3232 3456 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 988b8d3ae9f2303ee25180c3aba36130N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ratted.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2144 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 436 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 3456 ratted.exe 3456 ratted.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1076 988b8d3ae9f2303ee25180c3aba36130N.exe Token: SeDebugPrivilege 3456 ratted.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1076 wrote to memory of 1184 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 90 PID 1076 wrote to memory of 1184 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 90 PID 1076 wrote to memory of 1184 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 90 PID 1076 wrote to memory of 5028 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 92 PID 1076 wrote to memory of 5028 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 92 PID 1076 wrote to memory of 5028 1076 988b8d3ae9f2303ee25180c3aba36130N.exe 92 PID 5028 wrote to memory of 2144 5028 cmd.exe 94 PID 5028 wrote to memory of 2144 5028 cmd.exe 94 PID 5028 wrote to memory of 2144 5028 cmd.exe 94 PID 1184 wrote to memory of 436 1184 cmd.exe 95 PID 1184 wrote to memory of 436 1184 cmd.exe 95 PID 1184 wrote to memory of 436 1184 cmd.exe 95 PID 5028 wrote to memory of 3456 5028 cmd.exe 97 PID 5028 wrote to memory of 3456 5028 cmd.exe 97 PID 5028 wrote to memory of 3456 5028 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\988b8d3ae9f2303ee25180c3aba36130N.exe"C:\Users\Admin\AppData\Local\Temp\988b8d3ae9f2303ee25180c3aba36130N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "ratted" /tr '"C:\Users\Admin\AppData\Roaming\ratted.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "ratted" /tr '"C:\Users\Admin\AppData\Roaming\ratted.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8368.tmp.bat""2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2144
-
-
C:\Users\Admin\AppData\Roaming\ratted.exe"C:\Users\Admin\AppData\Roaming\ratted.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3456 -s 8164⤵
- Program crash
PID:3232
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3456 -ip 34561⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD52784a1a190d9c8d3f94afc38196d320f
SHA17c010548d4ffdc4fdce3c955ca1ec82572ea851a
SHA256a2b34cfb1ed3c16375302e4e6efc2b351617fe367d356b31bbe8033ca202c1c6
SHA512971d751919c36f608014834a52482fdf42ff0ddee990689c4c404aa9202c28bab632840a8d42ead4d44f34b5ba47ad47ec2db24014d2ee7251e5a32f3afc2502
-
Filesize
60KB
MD5988b8d3ae9f2303ee25180c3aba36130
SHA18b582769709c5c762740631a0aefc7f93f51c1c9
SHA2566ffe8e2aa7ebc17267ea90ddc0449d4f60306befd644adb60a26cbf9690f8ec6
SHA51221e11756a79b13fce2f5df5fca50ad18696fa6eba2b13245afef12d10cd9840761e0e4519e85cee5d5ac3fbac9c8b37aabec1e79e96a913277abc43ba1201832