Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/01/2025, 07:57

General

  • Target

    vfdjo.exe

  • Size

    35KB

  • MD5

    a03f28f2c0bf87d438a28e815d4b458a

  • SHA1

    60627893ce5e918c9b3dbe146f1b577f630129b5

  • SHA256

    1c9f4869c446e6e1e3c562631b1a10210294a7dd1367b4a58450b1a949e873e9

  • SHA512

    7ee6455f78cca337042521d024cdd4a54903e0b2276588b400fc9043354df28ca9cf0c9244028656c2e5e44e9f4889288aaa72e6d4ddb101380fb24d95727738

  • SSDEEP

    768:deBwuYH/uhx4yQF1F5e2nTesOhCZC3JtdkrDNxHloAnOT+k0uvN:dwwV2IfjeOOhCkmBlS+knN

Malware Config

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • StormKitty

    StormKitty is an open source info stealer written in C#.

  • StormKitty payload 5 IoCs
  • Stormkitty family
  • VenomRAT 5 IoCs

    Detects VenomRAT.

  • Venomrat family
  • Downloads MZ/PE file
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\vfdjo.exe
    "C:\Users\Admin\AppData\Local\Temp\vfdjo.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\jd1zwcbr\jd1zwcbr.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCF8F.tmp" "c:\Users\Admin\AppData\Local\Temp\jd1zwcbr\CSCECEAB6355844C0E8AD0F23C848A5736.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2548
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2824

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabEABE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESCF8F.tmp

    Filesize

    1KB

    MD5

    9775cdb63449686e8c19f616e2ee6504

    SHA1

    80a1ac6033105a5eae14043f4fa2a6e38a14e1f6

    SHA256

    b7240594a5e71d4dc24f08a56e2d3c54c0c8b6343fd422f34da1a9ac4b9e1397

    SHA512

    8e235536a121bda241a09944cc47e6fc92f748dd408b1dc5d604dfa992bf573d1ccfd694650ce2e1415193e6f73e282d99e1b9d6b8c4a789acf3d183524af888

  • C:\Users\Admin\AppData\Local\Temp\TarFC3F.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\jd1zwcbr\jd1zwcbr.dll

    Filesize

    9KB

    MD5

    b16c867a41cd0890cfee30323cae91c5

    SHA1

    f167a47e18485f5fc0dd0a42f4786a0f1bc901b0

    SHA256

    07eaedc075e0d93b2a2272e6ddecac18948ac0deb55f3deea2d3aad54005a5b1

    SHA512

    015a29f880c8725add9a282b3b5eaebcfde50b5b3a4630b8cd09f47291cc32eec6ef75236d8ef52b69335b5e78d2322d84ffcb1dd340f2d61ccb7548d9f29c06

  • \??\c:\Users\Admin\AppData\Local\Temp\jd1zwcbr\CSCECEAB6355844C0E8AD0F23C848A5736.TMP

    Filesize

    652B

    MD5

    a4e065f9193375e7d9467e3975808d13

    SHA1

    9ec872008ddf2b605b039e52f3f168284ab07418

    SHA256

    fd18e2a865c7dc6a2ad68d0c2c61a0cecb96fbf971a819ff533766c9b8ad79f8

    SHA512

    304108f983e94e4134dfdeaee9dc947be63b43d5d1abd238a172446c070c371b3b6637d8d43df44b38ab2b09f2f2330dc50218a9f31446e0caef673e7a6a5509

  • \??\c:\Users\Admin\AppData\Local\Temp\jd1zwcbr\jd1zwcbr.0.cs

    Filesize

    10KB

    MD5

    b5c3a2d03ff4c721192716f326c77dea

    SHA1

    6b754fd988ca58865674b711aba76d3c6b2c5693

    SHA256

    ab42fe5fd08cb87663e130f99f96124fdd37d825d081b9712b0bad8b6f270fac

    SHA512

    d32e5a98c12b6b85d1913555ea54f837cd0fc647ca945aef9d75ffade06506be1f4a2348827f11c4eeae0796e4156c8f352e3c0f9a6e2cdc93cb501bcdf2c248

  • \??\c:\Users\Admin\AppData\Local\Temp\jd1zwcbr\jd1zwcbr.cmdline

    Filesize

    204B

    MD5

    35d3243453b34d18fc39a5198b39d500

    SHA1

    3619d3ed33d1fe12d0d6f867fcd45e0cb1c8b475

    SHA256

    aa582c97df9fd76efc676a3c6d63974fd2702d7fabc96f30cdbfcdc32cc97079

    SHA512

    ef4bda89b3dbc0e53a3e89c22fead889c699121b82e6d8614cdf296a3bcab6b3aa44a9df78d613713d15d8b6a8b3522aac85225cdb50a7e125fdc44dfcfb265e

  • memory/2432-1-0x0000000000390000-0x00000000003A0000-memory.dmp

    Filesize

    64KB

  • memory/2432-4-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2432-15-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2432-0-0x000000007436E000-0x000000007436F000-memory.dmp

    Filesize

    4KB

  • memory/2432-29-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2824-24-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/2824-30-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/2824-22-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/2824-21-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/2824-17-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/2824-19-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB

  • memory/2824-23-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2824-26-0x0000000000400000-0x0000000000704000-memory.dmp

    Filesize

    3.0MB