Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
General
-
Target
.bat
-
Size
35KB
-
Sample
250122-wh338axqgz
-
MD5
e0f14d8b4e040e347ac4c68fa65ab34d
-
SHA1
7792151bebcc851456faf92760e66e63fd9db8b8
-
SHA256
7944c6a800e3956afceb244e4b58d6368858879cef8d225c0c870646e29405d5
-
SHA512
cacaaef3f5184ed6a0c2f7655114dabeee7bf5e163d65a1758ba209ceeac97c5d79210fc0c6d1c98ff2ac9c1664ddbbde00f3587af1cc9983d0047a3c3205991
-
SSDEEP
768:x+R8e3f87iaNQeCOarasWNMb5yMqX/9MFRb:+3UdNQAarapE
Static task
static1
Behavioral task
behavioral1
Sample
.bat
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
.bat
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
L838 RAT v1.0.0
Default
127.0.0.1:54984
coinbasecrashout.ddns.net:54984
jggjyaadwawdag
-
delay
3
-
install
true
-
install_file
Windows Font Manager.exe
-
install_folder
%AppData%
Extracted
xworm
https://pastebin.com/raw/rVJQPNVe:1135
-
Install_directory
%Userprofile%
-
install_file
Windows Security Wrapper.exe
-
pastebin_url
https://pastebin.com/raw/rVJQPNVe
Targets
-
-
Target
.bat
-
Size
35KB
-
MD5
e0f14d8b4e040e347ac4c68fa65ab34d
-
SHA1
7792151bebcc851456faf92760e66e63fd9db8b8
-
SHA256
7944c6a800e3956afceb244e4b58d6368858879cef8d225c0c870646e29405d5
-
SHA512
cacaaef3f5184ed6a0c2f7655114dabeee7bf5e163d65a1758ba209ceeac97c5d79210fc0c6d1c98ff2ac9c1664ddbbde00f3587af1cc9983d0047a3c3205991
-
SSDEEP
768:x+R8e3f87iaNQeCOarasWNMb5yMqX/9MFRb:+3UdNQAarapE
-
Asyncrat family
-
Detect Xworm Payload
-
Venomrat family
-
Xworm family
-
Async RAT payload
-
Blocklisted process makes network request
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
2Scheduled Task/Job
1Scheduled Task
1Persistence
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3