Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
93s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
07/11/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
Envio copia de la Notificacion electrnica Demanda/01 NOTIFICACION DEMANDA.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
Envio copia de la Notificacion electrnica Demanda/01 NOTIFICACION DEMANDA.exe
-
Size
275KB
-
MD5
b2d4b1d83945b5787d49a86c4f394e0c
-
SHA1
334a5c434e5d5d0649f8224e449ca9aaf9ba6816
-
SHA256
038d7b257b98421ad371189cf51d67f32ddad2de687c443a59ea74e4027bbf04
-
SHA512
4e92c367991a30d81a718ef26e8e61d24a84d2b54b5d9c6555f319b186ed5bc29d03fb10929bdae4d37c4fe92b3c0be63ee1ed4b287df74af7644e65053222d5
-
SSDEEP
6144:fONaSHaPlcCgYH9oYAd6q2vACSHaPlcCgYH9oY8HJF:fe969RTHGkIF69RTH6F
Malware Config
Extracted
asyncrat
| CRACKED BY https://t.me/xworm_v2
Default
en2025en.duckdns.org:3030
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3912 set thread context of 1704 3912 01 NOTIFICACION DEMANDA.exe 79 PID 1704 set thread context of 4884 1704 cmd.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01 NOTIFICACION DEMANDA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSBuild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1512 timeout.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3912 01 NOTIFICACION DEMANDA.exe 3912 01 NOTIFICACION DEMANDA.exe 1704 cmd.exe 1704 cmd.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 3912 01 NOTIFICACION DEMANDA.exe 1704 cmd.exe 1704 cmd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4884 MSBuild.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3912 wrote to memory of 1704 3912 01 NOTIFICACION DEMANDA.exe 79 PID 3912 wrote to memory of 1704 3912 01 NOTIFICACION DEMANDA.exe 79 PID 3912 wrote to memory of 1704 3912 01 NOTIFICACION DEMANDA.exe 79 PID 3912 wrote to memory of 1704 3912 01 NOTIFICACION DEMANDA.exe 79 PID 1704 wrote to memory of 4884 1704 cmd.exe 83 PID 1704 wrote to memory of 4884 1704 cmd.exe 83 PID 1704 wrote to memory of 4884 1704 cmd.exe 83 PID 1704 wrote to memory of 4884 1704 cmd.exe 83 PID 1704 wrote to memory of 4884 1704 cmd.exe 83 PID 4884 wrote to memory of 2516 4884 MSBuild.exe 85 PID 4884 wrote to memory of 2516 4884 MSBuild.exe 85 PID 4884 wrote to memory of 2516 4884 MSBuild.exe 85 PID 2516 wrote to memory of 1512 2516 cmd.exe 87 PID 2516 wrote to memory of 1512 2516 cmd.exe 87 PID 2516 wrote to memory of 1512 2516 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"C:\Users\Admin\AppData\Local\Temp\Envio copia de la Notificacion electrnica Demanda\01 NOTIFICACION DEMANDA.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7172.tmp.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\timeout.exetimeout 35⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1512
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
777KB
MD57b233b9c5a73d1b5a09f5773ec6e0d4d
SHA15f8fae1cfe908313f9b93c51acf666f6990096a6
SHA256e0860b4964e0d9818c246049eca1728778a14a05279e141b873151b8539104b9
SHA51232bc3a503c77b135fd4bf6fa24587d250e044f3b3697dd5af161da696e0e76c089354ed03743d63f923299197be3f84be537dd67900c58abe7a3403dd2c59e41
-
Filesize
171B
MD5cda9d29e367c0caca9655ce6015871b3
SHA1bf338e74bc23f1a81087ee48a82a2dfad335b0da
SHA25645e16df616216364abdc5c4772f4300f3404b9a3609b6ca3a22945319bab6fdb
SHA512c1144356b3f5a58f8268b83ddff62f2f1246abad988c9823f6c4ab5ce13c6ce86b624f9018e9efe2f02823ab3fdcf882b1019f2fe0ec50b6a6d2aeafe8eb7d11