Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
8Ehhbsuuemv.exe
windows7-x64
10Ehhbsuuemv.exe
windows10-2004-x64
10GjIEmKW.exe
windows7-x64
10GjIEmKW.exe
windows10-2004-x64
10Jtvcsfni.exe
windows7-x64
10Jtvcsfni.exe
windows10-2004-x64
10OriginalBuild.exe
windows7-x64
3OriginalBuild.exe
windows10-2004-x64
8PUMPED_docc.exe
windows7-x64
10PUMPED_docc.exe
windows10-2004-x64
10Servicing-...te.pdf
windows7-x64
3Servicing-...te.pdf
windows10-2004-x64
3cgu3.docx
windows7-x64
6cgu3.docx
windows10-2004-x64
6debt.rtf.lnk
windows7-x64
10debt.rtf.lnk
windows10-2004-x64
10eeee.dotm
windows7-x64
3eeee.dotm
windows10-2004-x64
1egor.dotm
windows7-x64
10egor.dotm
windows10-2004-x64
10errr.dotm
windows7-x64
3errr.dotm
windows10-2004-x64
1example.dotm
windows7-x64
10example.dotm
windows10-2004-x64
10fasfs.dotm
windows7-x64
10fasfs.dotm
windows10-2004-x64
10ferrr.dotm
windows7-x64
3ferrr.dotm
windows10-2004-x64
1fffffffnew.dotm
windows7-x64
10fffffffnew.dotm
windows10-2004-x64
10fp4h5ur67j.exe
windows7-x64
10fp4h5ur67j.exe
windows10-2004-x64
10Analysis
-
max time kernel
131s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/11/2024, 02:36
Behavioral task
behavioral1
Sample
Ehhbsuuemv.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Ehhbsuuemv.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
GjIEmKW.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
GjIEmKW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Jtvcsfni.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Jtvcsfni.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
OriginalBuild.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
OriginalBuild.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
PUMPED_docc.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
PUMPED_docc.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Servicing-invoice-template.pdf
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Servicing-invoice-template.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
cgu3.docx
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
cgu3.docx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
debt.rtf.lnk
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
debt.rtf.lnk
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
eeee.dotm
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
eeee.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
egor.dotm
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
egor.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
errr.dotm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
errr.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
example.dotm
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
example.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
fasfs.dotm
Resource
win7-20241010-en
Behavioral task
behavioral26
Sample
fasfs.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
ferrr.dotm
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
ferrr.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
fffffffnew.dotm
Resource
win7-20241010-en
Behavioral task
behavioral30
Sample
fffffffnew.dotm
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
fp4h5ur67j.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
fp4h5ur67j.exe
Resource
win10v2004-20241007-en
General
-
Target
Ehhbsuuemv.exe
-
Size
68.4MB
-
MD5
368dc6c24db6c1550ce757c0ffbdd9a0
-
SHA1
89bf95d951ac065bdfd8a323b1ecb70355bbab20
-
SHA256
9f3d5e17974ea77849869573fcca4be15d641ea937fc23fceb2808c59612b641
-
SHA512
78c94132c3f426930bcc80fc8dab760f3ecedcb6747150ba72319a23adedfda7c7cdc494122899cca914b7a1daa859f2a9c54c9bacf5b2e9c2f5519275fb2211
-
SSDEEP
1572864:iEmgHZAuBtRvd59Tdd6ok1vPtBQmjbPV4dDO4oJV36euF3SGzcqj0:zFHZAytD5xdd6FNPtBQeCdDO4oW/P4
Malware Config
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
45.137.65.94:4449
saiarsvkhzxxjyqd
-
delay
1
-
install
true
-
install_file
Google Update.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Detect ZGRat V2 1 IoCs
resource yara_rule behavioral1/memory/2720-3-0x0000000009680000-0x000000000978A000-memory.dmp family_zgrat_v2 -
resource yara_rule behavioral1/files/0x000500000001a4ef-10.dat VenomRAT behavioral1/memory/2708-13-0x0000000000290000-0x00000000002A8000-memory.dmp VenomRAT behavioral1/memory/284-57-0x00000000008C0000-0x00000000008D8000-memory.dmp VenomRAT -
Venomrat family
-
Zgrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000500000001a4ef-10.dat family_asyncrat -
Executes dropped EXE 3 IoCs
pid Process 2708 Mtuyzzclient6.exe 284 Google Update.exe 2644 Google Update.exe -
Loads dropped DLL 2 IoCs
pid Process 2720 Ehhbsuuemv.exe 1496 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2844 2720 Ehhbsuuemv.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ehhbsuuemv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language InstallUtil.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 2 IoCs
pid Process 1904 timeout.exe 2480 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2952 schtasks.exe 2368 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 2720 Ehhbsuuemv.exe 2844 InstallUtil.exe 2844 InstallUtil.exe 2844 InstallUtil.exe 2708 Mtuyzzclient6.exe 2708 Mtuyzzclient6.exe 2708 Mtuyzzclient6.exe 284 Google Update.exe 284 Google Update.exe 284 Google Update.exe 284 Google Update.exe 284 Google Update.exe 284 Google Update.exe 284 Google Update.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2720 Ehhbsuuemv.exe Token: SeDebugPrivilege 2844 InstallUtil.exe Token: SeDebugPrivilege 2708 Mtuyzzclient6.exe Token: SeDebugPrivilege 284 Google Update.exe Token: SeDebugPrivilege 2644 Google Update.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 284 Google Update.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2708 2720 Ehhbsuuemv.exe 30 PID 2720 wrote to memory of 2708 2720 Ehhbsuuemv.exe 30 PID 2720 wrote to memory of 2708 2720 Ehhbsuuemv.exe 30 PID 2720 wrote to memory of 2708 2720 Ehhbsuuemv.exe 30 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2720 wrote to memory of 2844 2720 Ehhbsuuemv.exe 31 PID 2844 wrote to memory of 3052 2844 InstallUtil.exe 32 PID 2844 wrote to memory of 3052 2844 InstallUtil.exe 32 PID 2844 wrote to memory of 3052 2844 InstallUtil.exe 32 PID 2844 wrote to memory of 3052 2844 InstallUtil.exe 32 PID 2844 wrote to memory of 1496 2844 InstallUtil.exe 33 PID 2844 wrote to memory of 1496 2844 InstallUtil.exe 33 PID 2844 wrote to memory of 1496 2844 InstallUtil.exe 33 PID 2844 wrote to memory of 1496 2844 InstallUtil.exe 33 PID 3052 wrote to memory of 2952 3052 cmd.exe 36 PID 3052 wrote to memory of 2952 3052 cmd.exe 36 PID 3052 wrote to memory of 2952 3052 cmd.exe 36 PID 3052 wrote to memory of 2952 3052 cmd.exe 36 PID 1496 wrote to memory of 1904 1496 cmd.exe 37 PID 1496 wrote to memory of 1904 1496 cmd.exe 37 PID 1496 wrote to memory of 1904 1496 cmd.exe 37 PID 1496 wrote to memory of 1904 1496 cmd.exe 37 PID 2708 wrote to memory of 2272 2708 Mtuyzzclient6.exe 38 PID 2708 wrote to memory of 2272 2708 Mtuyzzclient6.exe 38 PID 2708 wrote to memory of 2272 2708 Mtuyzzclient6.exe 38 PID 2272 wrote to memory of 2368 2272 cmd.exe 40 PID 2272 wrote to memory of 2368 2272 cmd.exe 40 PID 2272 wrote to memory of 2368 2272 cmd.exe 40 PID 2708 wrote to memory of 640 2708 Mtuyzzclient6.exe 41 PID 2708 wrote to memory of 640 2708 Mtuyzzclient6.exe 41 PID 2708 wrote to memory of 640 2708 Mtuyzzclient6.exe 41 PID 640 wrote to memory of 2480 640 cmd.exe 43 PID 640 wrote to memory of 2480 640 cmd.exe 43 PID 640 wrote to memory of 2480 640 cmd.exe 43 PID 1496 wrote to memory of 284 1496 cmd.exe 44 PID 1496 wrote to memory of 284 1496 cmd.exe 44 PID 1496 wrote to memory of 284 1496 cmd.exe 44 PID 1496 wrote to memory of 284 1496 cmd.exe 44 PID 640 wrote to memory of 2644 640 cmd.exe 45 PID 640 wrote to memory of 2644 640 cmd.exe 45 PID 640 wrote to memory of 2644 640 cmd.exe 45 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ehhbsuuemv.exe"C:\Users\Admin\AppData\Local\Temp\Ehhbsuuemv.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Mtuyzzclient6.exe"C:\Users\Admin\AppData\Local\Temp\Mtuyzzclient6.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Google Update" /tr '"C:\Users\Admin\AppData\Roaming\Google Update.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Google Update" /tr '"C:\Users\Admin\AppData\Roaming\Google Update.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:2368
-
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp819E.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:2480
-
-
C:\Users\Admin\AppData\Roaming\Google Update.exe"C:\Users\Admin\AppData\Roaming\Google Update.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2644
-
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Google Update" /tr '"C:\Users\Admin\AppData\Roaming\Google Update.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Google Update" /tr '"C:\Users\Admin\AppData\Roaming\Google Update.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp7B57.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1904
-
-
C:\Users\Admin\AppData\Roaming\Google Update.exe"C:\Users\Admin\AppData\Roaming\Google Update.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:284
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
74KB
MD51f304261de14934db9384720c638744a
SHA1b98f60e6feea77a31363d5a686e7be40f6cfc049
SHA256ab23ec09d1ea7a359bd834f2fef7aa5272e8f643e9c27cb2bfe8869a6e447e87
SHA51201f29cf8553d72070c56b953c23771fef9e4aba31b733b001f7b8a1e49e2cf02d120b21baf76ccfa9040548ed603c0308c95a4fedce7b4749fc01baf3c4fc826
-
Filesize
157B
MD510313b055491c488dced60caddafb571
SHA13fe476c1cdc9036bc99f35123badd79d6941ab45
SHA2569b9e4730d0a8bba065f533a0ebd4d6d062fcbfc9690bb8901ec45bfc4c75c352
SHA51200d6a7b1a7bce457354357662071d08e10afb56094a574ba65f62ca0a3acafe7c77b80c9a4720ab135d5245bcebdaaa217cb81418dd111a8a875c30f76c67f7b
-
Filesize
157B
MD5168931cc13b197f0babad9cb74bdc699
SHA1cf945a0e69e6b782bceff0d5f295b1e43f246230
SHA256447afe31bbd185a63d794c73b0c81c25eacfd297ca454a1a956c61e39e9ad16a
SHA51223df1fff1e7e0611c72614021f86ce284d8e457af855f60d2edf21cecb95fc0526aa241c1b6126c75536829bc68b29fb26704211f089cf32753047d142a5e985
-
Filesize
40KB
MD591c9ae9c9a17a9db5e08b120e668c74c
SHA150770954c1ceb0bb6f1d5d3f2de2a0a065773723
SHA256e56a7e5d3ab9675555e2897fc3faa2dd9265008a4967a7d54030ab8184d2d38f
SHA512ca504af192e3318359d4742a2ef26ae1b5d040a4f9942782e02549a310158d5d5dbf919b4c748c31ee609d2046bd23ee0c22712891c86ae4a1e3a58c6e67647e
-
Filesize
8B
MD5cf759e4c5f14fe3eec41b87ed756cea8
SHA1c27c796bb3c2fac929359563676f4ba1ffada1f5
SHA256c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761
SHA512c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b