Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/01/2025, 03:56

General

  • Target

    JaffaCakes118_777a952f66baa34bde02c6075430a407.exe

  • Size

    50KB

  • MD5

    777a952f66baa34bde02c6075430a407

  • SHA1

    e737be56566ab4f09abcf8988220f0517834851d

  • SHA256

    6143e80d28f382ac57c41eeab350f8be0e88f642211ae1726538685eb0686aa9

  • SHA512

    b707be23a181518d4a318101e8b5dc04dba26949cc2e743e50f054eefffdc0585a9a8502719f732d1855a841735771d43717ff4611b36d6a27598235f3023402

  • SSDEEP

    768:f95geQCs3gOm6tiJSaZok3PRBX4fIOJaWm+YrEGMlc9OtwCvU062:fQe3sQMtBa+y5OsWm+Ygz20v

Malware Config

Extracted

Family

asyncrat

Version

0.5.7B

Botnet

Default

C2

127.0.0.1:6606

127.0.0.1:7707

127.0.0.1:8808

192.168.137.247:6606

192.168.137.247:7707

192.168.137.247:8808

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Async RAT payload 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_777a952f66baa34bde02c6075430a407.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_777a952f66baa34bde02c6075430a407.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4900
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1224
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionPath @($env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3488
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c start C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
        C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2544

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

    Filesize

    2KB

    MD5

    968cb9309758126772781b83adb8a28f

    SHA1

    8da30e71accf186b2ba11da1797cf67f8f78b47c

    SHA256

    92099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a

    SHA512

    4bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

    Filesize

    18KB

    MD5

    963804e052333910e78e75cf7f7b4370

    SHA1

    b3729e77d62e3d1fe6828be28bd1bba9c6356db9

    SHA256

    f84295cb4db98d43d8386f70aafb3bd62944888a565f33b13bd77002ec905752

    SHA512

    8eb8da0a34bfd5fecd0f9506fc3fdf581f23ce53699565d5cdc231f80b943b775dcaa2b6783a333232f0db93a205e8f831bb7fb7765431bbdac83785bd66b8cd

  • C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe

    Filesize

    45KB

    MD5

    3f127abdbfa5ac67e53626fd66b0158d

    SHA1

    2ccd44e4f9bee67efd6b41697b05e75e911deb3c

    SHA256

    11fea91a8185b0f2d91e262d8dcb89046a77e257b90ebe63cb230c61c75b8456

    SHA512

    c2bd2241d563e3f957448e8a6ace2b0c1920c3c7162386e014c91b1df1b6029cb06c13fed262690ebe9e8e07c3840f3455791202defedff000e96e433dc00c7f

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f23v4fpk.ppz.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/2544-4-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/2544-78-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/2544-5-0x00000000003F0000-0x0000000000402000-memory.dmp

    Filesize

    72KB

  • memory/2544-76-0x0000000074AEE000-0x0000000074AEF000-memory.dmp

    Filesize

    4KB

  • memory/2544-43-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-38-0x00000000060B0000-0x00000000060CE000-memory.dmp

    Filesize

    120KB

  • memory/3488-44-0x0000000006EB0000-0x0000000006EBA000-memory.dmp

    Filesize

    40KB

  • memory/3488-11-0x0000000005260000-0x00000000052C6000-memory.dmp

    Filesize

    408KB

  • memory/3488-23-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-24-0x0000000005B10000-0x0000000005B2E000-memory.dmp

    Filesize

    120KB

  • memory/3488-25-0x0000000005BA0000-0x0000000005BEC000-memory.dmp

    Filesize

    304KB

  • memory/3488-37-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-27-0x0000000070980000-0x00000000709CC000-memory.dmp

    Filesize

    304KB

  • memory/3488-26-0x00000000060D0000-0x0000000006102000-memory.dmp

    Filesize

    200KB

  • memory/3488-12-0x0000000005380000-0x00000000053E6000-memory.dmp

    Filesize

    408KB

  • memory/3488-39-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-40-0x0000000006B00000-0x0000000006BA3000-memory.dmp

    Filesize

    652KB

  • memory/3488-41-0x0000000007480000-0x0000000007AFA000-memory.dmp

    Filesize

    6.5MB

  • memory/3488-42-0x0000000006E40000-0x0000000006E5A000-memory.dmp

    Filesize

    104KB

  • memory/3488-10-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-18-0x00000000054F0000-0x0000000005844000-memory.dmp

    Filesize

    3.3MB

  • memory/3488-45-0x00000000070D0000-0x0000000007166000-memory.dmp

    Filesize

    600KB

  • memory/3488-46-0x0000000007040000-0x0000000007051000-memory.dmp

    Filesize

    68KB

  • memory/3488-47-0x0000000007080000-0x000000000708E000-memory.dmp

    Filesize

    56KB

  • memory/3488-48-0x0000000007090000-0x00000000070A4000-memory.dmp

    Filesize

    80KB

  • memory/3488-49-0x0000000007170000-0x000000000718A000-memory.dmp

    Filesize

    104KB

  • memory/3488-50-0x00000000070C0000-0x00000000070C8000-memory.dmp

    Filesize

    32KB

  • memory/3488-53-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-9-0x0000000004B00000-0x0000000004B22000-memory.dmp

    Filesize

    136KB

  • memory/3488-6-0x0000000074AE0000-0x0000000075290000-memory.dmp

    Filesize

    7.7MB

  • memory/3488-8-0x0000000004B80000-0x00000000051A8000-memory.dmp

    Filesize

    6.2MB

  • memory/3488-7-0x0000000004510000-0x0000000004546000-memory.dmp

    Filesize

    216KB

  • memory/5112-66-0x0000000070980000-0x00000000709CC000-memory.dmp

    Filesize

    304KB

  • memory/5112-64-0x0000000005650000-0x00000000059A4000-memory.dmp

    Filesize

    3.3MB