Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04/01/2025, 03:56

General

  • Target

    JaffaCakes118_777a952f66baa34bde02c6075430a407.exe

  • Size

    50KB

  • MD5

    777a952f66baa34bde02c6075430a407

  • SHA1

    e737be56566ab4f09abcf8988220f0517834851d

  • SHA256

    6143e80d28f382ac57c41eeab350f8be0e88f642211ae1726538685eb0686aa9

  • SHA512

    b707be23a181518d4a318101e8b5dc04dba26949cc2e743e50f054eefffdc0585a9a8502719f732d1855a841735771d43717ff4611b36d6a27598235f3023402

  • SSDEEP

    768:f95geQCs3gOm6tiJSaZok3PRBX4fIOJaWm+YrEGMlc9OtwCvU062:fQe3sQMtBa+y5OsWm+Ygz20v

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

192.168.137.247:6606

192.168.137.247:7707

192.168.137.247:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_777a952f66baa34bde02c6075430a407.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_777a952f66baa34bde02c6075430a407.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2496
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2072
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2748
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2336
      • C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
        C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2388

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    7ca463dd54051ed0c761277784646a1f

    SHA1

    fe82b6c8f1ba74ffb06aa8040ee92513018323e6

    SHA256

    62e29935e8c5b48c703ce5f8e7d9fdb4ce87530b654d7d3eb85e1702c13ccef6

    SHA512

    e65a75ce4102c642f047684760b3bb2ed401c545d0ca197847d0a701f465889e95f3bc9d2fbed2235b4f63773ddb888920f7a7ee88fe4cf4f4eec6402055d022

  • \Users\Admin\AppData\Local\Temp\AsyncClient.exe

    Filesize

    45KB

    MD5

    3f127abdbfa5ac67e53626fd66b0158d

    SHA1

    2ccd44e4f9bee67efd6b41697b05e75e911deb3c

    SHA256

    11fea91a8185b0f2d91e262d8dcb89046a77e257b90ebe63cb230c61c75b8456

    SHA512

    c2bd2241d563e3f957448e8a6ace2b0c1920c3c7162386e014c91b1df1b6029cb06c13fed262690ebe9e8e07c3840f3455791202defedff000e96e433dc00c7f

  • memory/2388-4-0x000000007411E000-0x000000007411F000-memory.dmp

    Filesize

    4KB

  • memory/2388-7-0x0000000000080000-0x0000000000092000-memory.dmp

    Filesize

    72KB

  • memory/2388-13-0x000000007411E000-0x000000007411F000-memory.dmp

    Filesize

    4KB