Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    10s
  • platform
    windows10-1703_x64
  • resource
    win10-20240404-en
  • resource tags

    arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system
  • submitted
    19/10/2024, 13:07 UTC

General

  • Target

    NL Brute ACTIVATEOR.exe

  • Size

    226KB

  • MD5

    dbd8368aacabeb2f3007f2e41651e43e

  • SHA1

    fc83221eca35d6fe5e71d12caa63d6b19fc702b5

  • SHA256

    06da872afe3d9c80535c2fccdbe7054d299de1285cdf3666fa1a69a1a288c287

  • SHA512

    4580870152c081843e0d6de2d6ad6a7b4b6fda017b09722720bb87c3ca790765cf355a6abf20810217085d8dc00a6fc2fe517d069214f64387ad59880a632f32

  • SSDEEP

    3072:Z+STW8djpN6izj8mZw/Zf7/dFoUbBjXpW+WQwARPzjjyCYNMUL6+Wp0:m8XN6W8mm/VgUbfNBdnGd

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

https://api.telegram.org/bot5787513945:AAHk4B_J3fjaWnYKNH9snbwB6zLOSTidL0E/sendMessage?chat_id=5611920321

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain
1
gVGEXBoNH8Ip5YFU1iHQUEzHZivhmo9P

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 9 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NL Brute ACTIVATEOR.exe
    "C:\Users\Admin\AppData\Local\Temp\NL Brute ACTIVATEOR.exe"
    1⤵
    • Drops desktop.ini file(s)
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2116
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:4536
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:804
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show profile
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Wi-Fi Discovery
        PID:1472
      • C:\Windows\SysWOW64\findstr.exe
        findstr All
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4652
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4684
      • C:\Windows\SysWOW64\chcp.com
        chcp 65001
        3⤵
        • System Location Discovery: System Language Discovery
        PID:600
      • C:\Windows\SysWOW64\netsh.exe
        netsh wlan show networks mode=bssid
        3⤵
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:4644

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\29e692a91c1575a9b8b62ae3f9d03bea\Admin@DFZPKZRM_en-US\System\Process.txt

    Filesize

    4KB

    MD5

    16f62089a547fb334e999de782e9f2e1

    SHA1

    e9cc1d1d69522fa2f0e4a73f9538b4fb638b1f3f

    SHA256

    9b46f318406c1f758a1d9f9fc3ec104b12133ff8e079cbaa39ca393aa13e9364

    SHA512

    0cef05207f3b69288173a6d3cf698e38449e526099b38a6a22408f5c1d8f715417be81fc39367d8e79fcf1a64dcfd6d14a9d8dc08f9629054d9774efaf34c595

  • memory/2116-0-0x0000000073A0E000-0x0000000073A0F000-memory.dmp

    Filesize

    4KB

  • memory/2116-1-0x0000000000560000-0x000000000059E000-memory.dmp

    Filesize

    248KB

  • memory/2116-2-0x0000000073A00000-0x00000000740EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2116-3-0x0000000004F00000-0x0000000004F66000-memory.dmp

    Filesize

    408KB

  • memory/2116-119-0x0000000073A00000-0x00000000740EE000-memory.dmp

    Filesize

    6.9MB

  • memory/2116-120-0x0000000005820000-0x00000000058B2000-memory.dmp

    Filesize

    584KB

  • memory/2116-121-0x0000000005DC0000-0x00000000062BE000-memory.dmp

    Filesize

    5.0MB

  • memory/2116-123-0x0000000073A0E000-0x0000000073A0F000-memory.dmp

    Filesize

    4KB

  • memory/2116-126-0x0000000005A50000-0x0000000005A5A000-memory.dmp

    Filesize

    40KB

  • memory/2116-127-0x0000000073A00000-0x00000000740EE000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.