Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/12/2024, 16:54 UTC
Behavioral task
behavioral1
Sample
..exe
Resource
win7-20240708-en
General
-
Target
..exe
-
Size
145KB
-
MD5
a55e72b66a2767fa68ae713250ff0b21
-
SHA1
550d1c5ef3c23cc59392ea24c67f4f43669cecef
-
SHA256
a31527ac5e1df418a9ee25b623ad730c44e18b4b62aa6e649bb6e5fd9e0088f5
-
SHA512
cb47663be048c07c6e9e6387946a512f0435be1a4034a5ee2549025b70cd4c5868bfba0ea3e76af0700492f1c8dc388f83e0c7f37ac64011ed2eaca06daef1d2
-
SSDEEP
3072:VuIJT8kD2gEdIOcYgb8GHOxk0y+Bz65/M6If+3Js+3JFkKeTnYx:VuITSzCOPgbmyMxBt25v
Malware Config
Extracted
asyncrat
0.5.8
Default
192.168.0.174:8808
ejrY4UrkOJwj
-
delay
3
-
install
true
-
install_file
System Handler.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000f000000012782-13.dat family_asyncrat -
Executes dropped EXE 1 IoCs
pid Process 2204 System Handler.exe -
Loads dropped DLL 1 IoCs
pid Process 2684 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language System Handler.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ..exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2852 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1292 ..exe 1292 ..exe 1292 ..exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1292 ..exe Token: SeDebugPrivilege 2204 System Handler.exe Token: SeDebugPrivilege 2204 System Handler.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2624 1292 ..exe 32 PID 1292 wrote to memory of 2624 1292 ..exe 32 PID 1292 wrote to memory of 2624 1292 ..exe 32 PID 1292 wrote to memory of 2624 1292 ..exe 32 PID 1292 wrote to memory of 2684 1292 ..exe 34 PID 1292 wrote to memory of 2684 1292 ..exe 34 PID 1292 wrote to memory of 2684 1292 ..exe 34 PID 1292 wrote to memory of 2684 1292 ..exe 34 PID 2624 wrote to memory of 2796 2624 cmd.exe 37 PID 2624 wrote to memory of 2796 2624 cmd.exe 37 PID 2624 wrote to memory of 2796 2624 cmd.exe 37 PID 2624 wrote to memory of 2796 2624 cmd.exe 37 PID 2684 wrote to memory of 2852 2684 cmd.exe 36 PID 2684 wrote to memory of 2852 2684 cmd.exe 36 PID 2684 wrote to memory of 2852 2684 cmd.exe 36 PID 2684 wrote to memory of 2852 2684 cmd.exe 36 PID 2684 wrote to memory of 2204 2684 cmd.exe 38 PID 2684 wrote to memory of 2204 2684 cmd.exe 38 PID 2684 wrote to memory of 2204 2684 cmd.exe 38 PID 2684 wrote to memory of 2204 2684 cmd.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\..exe"C:\Users\Admin\AppData\Local\Temp\..exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "System Handler" /tr '"C:\Users\Admin\AppData\Roaming\System Handler.exe"' & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "System Handler" /tr '"C:\Users\Admin\AppData\Roaming\System Handler.exe"'3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2796
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpE698.tmp.bat""2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2852
-
-
C:\Users\Admin\AppData\Roaming\System Handler.exe"C:\Users\Admin\AppData\Roaming\System Handler.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
Network
- No results found
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
152 B 3
-
104 B 2
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158B
MD5e39809a7abafc5c658ef2591628ee19e
SHA1c6b638a62a6c19d3cebfa6ce88076c50d82e8627
SHA2567995eb44177f4f1aa4ed65b35d00cf9088960d16c26272982313bc0e124518d4
SHA512bb840b7b62f9932089f0528c92f9e7888bd5937a6ddda7475fae0c198ee572b4b74113cbf54b669d3ba9f18e03c8f2cd6783e61ac04a9fffdcda93d81b3b336d
-
Filesize
145KB
MD5a55e72b66a2767fa68ae713250ff0b21
SHA1550d1c5ef3c23cc59392ea24c67f4f43669cecef
SHA256a31527ac5e1df418a9ee25b623ad730c44e18b4b62aa6e649bb6e5fd9e0088f5
SHA512cb47663be048c07c6e9e6387946a512f0435be1a4034a5ee2549025b70cd4c5868bfba0ea3e76af0700492f1c8dc388f83e0c7f37ac64011ed2eaca06daef1d2