Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
27s -
max time network
28s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
11/01/2025, 17:33
General
-
Target
Infected.exe
-
Size
63KB
-
MD5
abcbbfd4f4cdcef98962ad976802fb69
-
SHA1
ecce5776a92707e00b28441975e73a715f9e2185
-
SHA256
1ee1af228d0cfcf2beae5a2df53a291d24fb6213c5e453cfb09c155b20a7a965
-
SHA512
e38348d3f6983e02378dd4649630fd0a39ad6428bc82aa6f2738f1ec794b9b48db7457b3009f7f65e49fc5d994dcde6105fdf72bd572086d8017558aab541100
-
SSDEEP
768:RdGnVhwdjndk78TQC8A+XiuazcBRL5JTk1+T4KSBGHmDbD/ph0oXQxa/qSuAdpqM:mnSdsNdSJYUbdh9QxaFuAdpqKmY7
Malware Config
Extracted
asyncrat
Default
mbaper-28496.portmap.host:2420
mbaper-28496.portmap.host:28833
-
delay
1
-
install
true
-
install_file
Google.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x00290000000461c6-11.dat family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1006597246-3150276181-3318461161-1000\Control Panel\International\Geo\Nation Infected.exe -
Executes dropped EXE 1 IoCs
pid Process 2980 Google.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 1228 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4104 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe 3828 Infected.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3828 Infected.exe Token: SeDebugPrivilege 2980 Google.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3828 wrote to memory of 1740 3828 Infected.exe 80 PID 3828 wrote to memory of 1740 3828 Infected.exe 80 PID 3828 wrote to memory of 1116 3828 Infected.exe 81 PID 3828 wrote to memory of 1116 3828 Infected.exe 81 PID 1740 wrote to memory of 4104 1740 cmd.exe 84 PID 1740 wrote to memory of 4104 1740 cmd.exe 84 PID 1116 wrote to memory of 1228 1116 cmd.exe 85 PID 1116 wrote to memory of 1228 1116 cmd.exe 85 PID 1116 wrote to memory of 2980 1116 cmd.exe 86 PID 1116 wrote to memory of 2980 1116 cmd.exe 86 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Infected.exe"C:\Users\Admin\AppData\Local\Temp\Infected.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Google" /tr '"C:\Users\Admin\AppData\Roaming\Google.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Google" /tr '"C:\Users\Admin\AppData\Roaming\Google.exe"'3⤵
- Scheduled Task/Job: Scheduled Task
PID:4104
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBA09.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1228
-
-
C:\Users\Admin\AppData\Roaming\Google.exe"C:\Users\Admin\AppData\Roaming\Google.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2980
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150B
MD562fc91f9de77c0026af6b51f3b1f5098
SHA18ffc8306997d6c2c3ed5a15d51a1834a9171b5c2
SHA256a715c8695430833bed3e7f12a874c106169176bfe8ca91cf03fae0d9dbe83f3b
SHA512a068a5ae9b7b23a58e3909a544c639b3764b26212df2eea6090eae99504046e41cd4134bbc8f2f05b40314c0374ddf188f07d6e1dea9d54178e15cdabc33bfa3
-
Filesize
63KB
MD5abcbbfd4f4cdcef98962ad976802fb69
SHA1ecce5776a92707e00b28441975e73a715f9e2185
SHA2561ee1af228d0cfcf2beae5a2df53a291d24fb6213c5e453cfb09c155b20a7a965
SHA512e38348d3f6983e02378dd4649630fd0a39ad6428bc82aa6f2738f1ec794b9b48db7457b3009f7f65e49fc5d994dcde6105fdf72bd572086d8017558aab541100