Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2024, 22:12 UTC

General

  • Target

    051c00ab3f4813f84c1e44fe9849771a475cbaf07f2d4ab46070256373066ab0.exe

  • Size

    1.9MB

  • MD5

    18b14e2c7f00211fc1f0754e8a7ffaaa

  • SHA1

    76427d23956181faa779af76b5a4865b1c67a37d

  • SHA256

    051c00ab3f4813f84c1e44fe9849771a475cbaf07f2d4ab46070256373066ab0

  • SHA512

    1cd41010883f87297de7d64428fa555a291fdec9ac55c3d90b764394f7f503e72fae6f9617a158c6b8399df77f17ce97e048107bd24b55077c5410263377429f

  • SSDEEP

    49152:1Y0DiBirYhIstmZrbQhrHqxZrbQhrHqYlMgI4nrgMYNuopxNXUXua67o+:1Y0DqtmZrbQhrHqxZrbQhrHqesNZai/

Malware Config

Extracted

Family

asyncrat

Version

1.0.7

Botnet

27 NOVIE

C2

RadicadoYActas.casacam.net:2247

Mutex

TERTE

Attributes
  • delay

    5

  • install

    false

  • install_folder

    %AppData%

aes.plain
1
d5VDhYcSorxcaH4g6RWc4qhPapQs9b6L

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\051c00ab3f4813f84c1e44fe9849771a475cbaf07f2d4ab46070256373066ab0.exe
    "C:\Users\Admin\AppData\Local\Temp\051c00ab3f4813f84c1e44fe9849771a475cbaf07f2d4ab46070256373066ab0.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2560

Network

  • flag-us
    DNS
    RadicadoYActas.casacam.net
    csc.exe
    Remote address:
    8.8.8.8:53
    Request
    RadicadoYActas.casacam.net
    IN A
    Response
    RadicadoYActas.casacam.net
    IN A
    179.13.2.154
  • flag-us
    DNS
    RadicadoYActas.casacam.net
    csc.exe
    Remote address:
    8.8.8.8:53
    Request
    RadicadoYActas.casacam.net
    IN A
    Response
    RadicadoYActas.casacam.net
    IN A
    179.13.2.154
  • 179.13.2.154:2247
    RadicadoYActas.casacam.net
    csc.exe
    152 B
    3
  • 179.13.2.154:2247
    RadicadoYActas.casacam.net
    csc.exe
    152 B
    3
  • 179.13.2.154:2247
    RadicadoYActas.casacam.net
    csc.exe
    152 B
    3
  • 179.13.2.154:2247
    RadicadoYActas.casacam.net
    csc.exe
    152 B
    3
  • 179.13.2.154:2247
    RadicadoYActas.casacam.net
    csc.exe
    152 B
    3
  • 179.13.2.154:2247
    RadicadoYActas.casacam.net
    csc.exe
    52 B
    1
  • 8.8.8.8:53
    RadicadoYActas.casacam.net
    dns
    csc.exe
    72 B
    88 B
    1
    1

    DNS Request

    RadicadoYActas.casacam.net

    DNS Response

    179.13.2.154

  • 8.8.8.8:53
    RadicadoYActas.casacam.net
    dns
    csc.exe
    72 B
    88 B
    1
    1

    DNS Request

    RadicadoYActas.casacam.net

    DNS Response

    179.13.2.154

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2396-18-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-0-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-6-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-7-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-5-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-3-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-23-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-24-0x0000000000416000-0x000000000042F000-memory.dmp

    Filesize

    100KB

  • memory/2396-20-0x0000000000416000-0x000000000042F000-memory.dmp

    Filesize

    100KB

  • memory/2396-17-0x0000000000400000-0x00000000005E3000-memory.dmp

    Filesize

    1.9MB

  • memory/2396-1-0x0000000000416000-0x000000000042F000-memory.dmp

    Filesize

    100KB

  • memory/2560-15-0x0000000000080000-0x0000000000092000-memory.dmp

    Filesize

    72KB

  • memory/2560-13-0x0000000000080000-0x0000000000092000-memory.dmp

    Filesize

    72KB

  • memory/2560-8-0x0000000000080000-0x0000000000092000-memory.dmp

    Filesize

    72KB

  • memory/2560-19-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/2560-21-0x0000000074CD0000-0x00000000753BE000-memory.dmp

    Filesize

    6.9MB

  • memory/2560-22-0x0000000074CDE000-0x0000000074CDF000-memory.dmp

    Filesize

    4KB

  • memory/2560-9-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

    Filesize

    4KB

  • memory/2560-10-0x0000000000080000-0x0000000000092000-memory.dmp

    Filesize

    72KB

  • memory/2560-25-0x0000000074CD0000-0x00000000753BE000-memory.dmp

    Filesize

    6.9MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.