Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
100s -
max time network
139s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
07/11/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
Envio copia de la Notificacion electrnica Demanda/01 NOTIFICACION DEMANDA.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Envio copia de la Notificacion electrnica Demanda/01 NOTIFICACION DEMANDA.exe
-
Size
275KB
-
MD5
b2d4b1d83945b5787d49a86c4f394e0c
-
SHA1
334a5c434e5d5d0649f8224e449ca9aaf9ba6816
-
SHA256
038d7b257b98421ad371189cf51d67f32ddad2de687c443a59ea74e4027bbf04
-
SHA512
4e92c367991a30d81a718ef26e8e61d24a84d2b54b5d9c6555f319b186ed5bc29d03fb10929bdae4d37c4fe92b3c0be63ee1ed4b287df74af7644e65053222d5
-
SSDEEP
6144:fONaSHaPlcCgYH9oYAd6q2vACSHaPlcCgYH9oY8HJF:fe969RTHGkIF69RTH6F
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
en2025en.duckdns.org:3030
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1104 set thread context of 3760 1104 01 NOTIFICACION DEMANDA.exe 86 PID 3760 set thread context of 636 3760 cmd.exe 96 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01 NOTIFICACION DEMANDA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1980 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1104 01 NOTIFICACION DEMANDA.exe 1104 01 NOTIFICACION DEMANDA.exe 3760 cmd.exe 3760 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 1104 01 NOTIFICACION DEMANDA.exe 3760 cmd.exe 3760 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 636 MSBuild.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1104 wrote to memory of 3760 1104 01 NOTIFICACION DEMANDA.exe 86 PID 1104 wrote to memory of 3760 1104 01 NOTIFICACION DEMANDA.exe 86 PID 1104 wrote to memory of 3760 1104 01 NOTIFICACION DEMANDA.exe 86 PID 1104 wrote to memory of 3760 1104 01 NOTIFICACION DEMANDA.exe 86 PID 3760 wrote to memory of 636 3760 cmd.exe 96 PID 3760 wrote to memory of 636 3760 cmd.exe 96 PID 3760 wrote to memory of 636 3760 cmd.exe 96 PID 3760 wrote to memory of 636 3760 cmd.exe 96 PID 3760 wrote to memory of 636 3760 cmd.exe 96 PID 636 wrote to memory of 1412 636 MSBuild.exe 98 PID 636 wrote to memory of 1412 636 MSBuild.exe 98 PID 636 wrote to memory of 1412 636 MSBuild.exe 98 PID 1412 wrote to memory of 1980 1412 cmd.exe 100 PID 1412 wrote to memory of 1980 1412 cmd.exe 100 PID 1412 wrote to memory of 1980 1412 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"C:\Users\Admin\AppData\Local\Temp\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7C01.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1980
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD5871ccf4b4b9c231153a92c6d351a7549
SHA1d7a56a7600e5b3401fa6f8f281a02e27a24e3cad
SHA25689909de6b1534fe096c057abf7b65393065a9b370db37d42675d9bcf6d5500ef
SHA5124c323d20611e95dc62437daf758fbb8967c316f66613a60f2986ab6801f496291608fdf58ad062e37e262b84a29327d2a37f33faef12b977239aa076fcdf6023
-
Filesize
171B
MD55387216aa59a18e99e61f5dad9cde341
SHA106227c9429fbd142098863947a1412b5cca02d7a
SHA256d28d69ff13d5e596d3ea22544255324ed8a9bb22e932df65b96fc96a07fcaaf0
SHA512f1cfd436c3ab0958f26ed496257dacf70665f6c429b42d03133cc5a411ed6e2f0c6500cdb98ba2489599cc1a61d47b11aa73ab853c5822fb0fd50b61b09831b6