Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/01/2025, 08:02
Behavioral task
behavioral1
Sample
AsyncClient.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
AsyncClient.exe
-
Size
45KB
-
MD5
ca214fb9b9396bdf7b9309f0c88c8245
-
SHA1
2070423090e9311fdd6946fce08f7ab02eeaf97b
-
SHA256
0a3298906b485c8e6e29be475db5774a24951c5be50c2b49b46b0f7a781a16be
-
SHA512
244c9de86f9ae092be65d8efeb6359d862470563c1302e514cb55a18b822ef07643d86dfb2233c76b10413a51c9f56ef841a1c0ea834ebaa5ddff258e2396f66
-
SSDEEP
768:VuPK1TVF5l6NWUtb2Hmo2qINKjPGaG6PIyzjbFgX3iK5ogMAk15BDZfx:VuPK1TV/l12NKTkDy3bCXSKfGJdfx
Malware Config
Extracted
asyncrat
0.5.8
Default
83.99.11.13:6606
83.99.11.13:7707
83.99.11.13:8808
192.168.178.1:6606
192.168.178.1:7707
192.168.178.1:8808
255.255.255.0:6606
255.255.255.0:7707
255.255.255.0:8808
192.168.178.56:6606
192.168.178.56:7707
192.168.178.56:8808
192.168.56.1:6606
192.168.56.1:7707
192.168.56.1:8808
172.29.128.1:6606
172.29.128.1:7707
172.29.128.1:8808
HTKBgEz9kLr9
-
delay
3
-
install
false
-
install_file
virus.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient.exe -
Modifies registry class 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 448 MiniSearchHost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"C:\Users\Admin\AppData\Local\Temp\AsyncClient.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2808
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5852
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:448
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:3348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\6659c1ab-f014-46f4-9a08-06d98c42d1b1.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3