Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/03/2025, 02:28

General

  • Target

    a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380.exe

  • Size

    25.9MB

  • MD5

    04e428b8cc919452e07cae9081618efc

  • SHA1

    4c9d1a66a524c1e8a9dcea02bcaa8c75698c0f09

  • SHA256

    a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380

  • SHA512

    88a3ab0a23ace92ac768ff09e796d226da89c22398dc790d25b257615bf71ce8692cd796bb057487fbc0b3a783148192cbd26e25af901b328ef3e4858fed1238

  • SSDEEP

    393216:lR6gS5im4Pu9cuxaIp/ePQ92c4SbeRna5UgMXD/3PAZWiTGxtC4F7RNfa/1:lrS57Kuxdt92bSKRsgJiTG24Zi/1

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3232

103.17.38.43:3232

Attributes
  • delay

    1

  • install

    true

  • install_file

    chrome.exe

  • install_folder

    %AppData%

aes.plain

Extracted

Family

xworm

C2

127.0.0.1:7000

192.168.4.185:7000

192.168.4.182:7000

192.168.4.181:7000

103.17.38.43:7000

103.17.38.40/29:7000

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    chrome.exe

Extracted

Family

asyncrat

Version

Venom RAT + HVNC + Stealer + Grabber v6.0.3

Botnet

Default

C2

127.0.0.1:4449

103.17.38.43:4449

192.168.4.182:4449

Mutex

chrome

Attributes
  • delay

    1

  • install

    true

  • install_file

    svh.exe

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Detect Xworm Payload 6 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Async RAT payload 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 8 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380.exe
    "C:\Users\Admin\AppData\Local\Temp\a6b4d63cfb361f2bbc15e1bb8861b183227f817d3a67fe5ab2b001a1e6011380.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Roaming\G160.exe
      "C:\Users\Admin\AppData\Roaming\G160.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Checks for VirtualBox DLLs, possible anti-VM trick
      • Suspicious behavior: EnumeratesProcesses
      PID:680
    • C:\Users\Admin\AppData\Roaming\chrome.exe
      "C:\Users\Admin\AppData\Roaming\chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1756
    • C:\Users\Admin\AppData\Roaming\chrome vecom.exe
      "C:\Users\Admin\AppData\Roaming\chrome vecom.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"' & exit
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2288
        • C:\Windows\system32\schtasks.exe
          schtasks /create /f /sc onlogon /rl highest /tn "svh" /tr '"C:\Users\Admin\AppData\Roaming\svh.exe"'
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:1696
      • C:\Windows\system32\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD94F.tmp.bat""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1724
        • C:\Windows\system32\timeout.exe
          timeout 3
          4⤵
          • Delays execution with timeout.exe
          PID:1884
        • C:\Users\Admin\AppData\Roaming\svh.exe
          "C:\Users\Admin\AppData\Roaming\svh.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1212
    • C:\Users\Admin\AppData\Roaming\chrome2.exe
      "C:\Users\Admin\AppData\Roaming\chrome2.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome2.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome2.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2244
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:608
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious use of AdjustPrivilegeToken
        PID:2796
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\Users\Admin\AppData\Local\chrome.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2560
    • C:\Users\Admin\AppData\Roaming\chrome1.exe
      "C:\Users\Admin\AppData\Roaming\chrome1.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\chrome1.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome1.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:832
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'chrome.exe'
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1320
      • C:\Windows\System32\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "chrome" /tr "C:\ProgramData\chrome.exe"
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2192
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {F721A157-2B9D-4635-B787-C25F51294FFB} S-1-5-21-4177215427-74451935-3209572229-1000:JSMURNPT\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Users\Admin\AppData\Local\chrome.exe
      C:\Users\Admin\AppData\Local\chrome.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2348
    • C:\Users\Admin\AppData\Local\chrome.exe
      C:\Users\Admin\AppData\Local\chrome.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:2516

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpD94F.tmp.bat

    Filesize

    147B

    MD5

    4534b949307d52dfd52f8e58c8c2859d

    SHA1

    68427be0e0d38fd089200856764f04353f0f4d04

    SHA256

    07c4f385fdd81212c0541c1b7b7defc3eac0de9500326c98f7c78501883acb79

    SHA512

    d606d4c8931911fdb3db1b91b0ef04a5f5c2d34ab983cffa3765b2ff5f5bd7419b51bbd01df5e821af8f61434c0e9304e1b47892c6d651a180fff129c69ce593

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    79310878fa3f405b3f6ac8e920404729

    SHA1

    a95dc79851e00aff99a8f9106ca2897044556f8b

    SHA256

    9ffd89368e459bf7ac726cb96109bcfd8e07381ed5c99e7249b52d707f43dd6f

    SHA512

    b48a8f14f5d3be5b3ecb26ee60509533e83705bf930d5667f044ac1b6bcd7e85ace843f1b4a1e5e2d2f40480e0389765149a1626a59672fce3cf6f2bca1b21d2

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

    Filesize

    7KB

    MD5

    dcb5484594857d08845fada05f96c616

    SHA1

    df93d19e9a31af57d4f8510bd9472211aba3ec9a

    SHA256

    d9d2dcc741825e09be89003a1efebf4e732dd19b12ebc6256c0340f9f31a7f65

    SHA512

    17dca968625de1db6506c2414bbd3e7dee71355900c45acf2e07345d1e13b2278df0da33d7f4fb4fb31d3e88f8c7b44bebf6d1a1d0e46338a3eda0947b75f75f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\chrome.lnk

    Filesize

    628B

    MD5

    6aab43c8ea3adcf2a3ab263d0958ade2

    SHA1

    bbfb6122ffbc2f5b070840afb67f5fde91863613

    SHA256

    4fd9006dee912d6ad70e8c97b238bc754531a91a667fa9569b9b916e6d51c0c9

    SHA512

    ea016e205f05539dc5dc54f66cacf44d451ffdf785d8dd89cc2123db3d58a11eb24dd7bad2a1b5b2e42d34e726f2a40b780778da0ef106791cf691a7fe618a5a

  • C:\Users\Admin\AppData\Roaming\MyData\DataLogs.conf

    Filesize

    8B

    MD5

    cf759e4c5f14fe3eec41b87ed756cea8

    SHA1

    c27c796bb3c2fac929359563676f4ba1ffada1f5

    SHA256

    c9f9f193409217f73cc976ad078c6f8bf65d3aabcf5fad3e5a47536d47aa6761

    SHA512

    c7f832aee13a5eb36d145f35d4464374a9e12fa2017f3c2257442d67483b35a55eccae7f7729243350125b37033e075efbc2303839fd86b81b9b4dca3626953b

  • C:\Users\Admin\AppData\Roaming\chrome vecom.exe

    Filesize

    187KB

    MD5

    f16744580bc9d4a51f5af484d2c3c65c

    SHA1

    729f833612d72845e4c97b42c90d126928809db4

    SHA256

    56d565760b89b9259743d216b61800067ee6819c2bef561d65984800ec64ca2a

    SHA512

    e047562a698ee280a3638af1551639538cea5ac76def9d755b3ee8612c01c5aeee0bb766539c2323f1fdbabe2f95c2fa72bcb37e661b74d3cd95bdf0ec1a9186

  • C:\Users\Admin\AppData\Roaming\chrome.exe

    Filesize

    176KB

    MD5

    60cb37e6977e0827cca5f5ccc7067b08

    SHA1

    c1f3b308c757552b20dfbcac77a85a09a372a526

    SHA256

    ae1acfc8b6276996042c230c16ce581d242dd9007ca6fa3044c63104f08be9c2

    SHA512

    ee8528fe4a7ab7c25c0ef329b3fe1baaa33e4f798621a246acb86a6327a187c129be738796efe416e030411421d8bb733326594c356fa3fefc359c79c631f4cc

  • C:\Users\Admin\AppData\Roaming\chrome1.exe

    Filesize

    174KB

    MD5

    e7be301f2c3a4b88a3fdc12c573fd515

    SHA1

    3d0a0195fbe314e3ba3c985b5614dcffb956fed5

    SHA256

    96d2f88dcc0707f655922020a6bffc1f005a18d1d3b7207b8eb44f22435d7541

    SHA512

    c85a9d29414cc6eaf872a031468611a5a383a68c1c39026c60345f8c4e3314e181fcef1d7477ddddf961fce08a150aed21de7b8055de3a7c973b1c6d07641cb1

  • C:\Users\Admin\AppData\Roaming\chrome2.exe

    Filesize

    194KB

    MD5

    d24ca6b94b01c980715f202aed2afc1a

    SHA1

    e68c8f902483079def7e17ac64530c46c0d3d98e

    SHA256

    5dd2f724c6d7c769139832531f76d42a95aa7eaed9e7c2919dc717974ba0c13a

    SHA512

    aa74c884e4eee53f5299ec3af2503903e4a50c0a51f47f0ac705e3f325d28aecf60baad68475736308d83fdd05a924a5fc027f9868b1262c224037b742ec8f1b

  • \Users\Admin\AppData\Roaming\G160.exe

    Filesize

    25.1MB

    MD5

    ed8d8078866b64f59d97276f5725168f

    SHA1

    1195dde78e8e64b5aec5466f777a71261652e890

    SHA256

    d6b3b4f34df598fa13c637680d57b68aca1414c16a7480fb45a34fa26e203a8b

    SHA512

    c9ef5bde60109be58c4889b3403169dc78806eb34af5b13932df48b756597a9d6265f676fcc9f7c13f73d0188a3089ea16dce1d3b626dea8c0bf82c4dd5d44d7

  • memory/680-88-0x0000000077820000-0x0000000077822000-memory.dmp

    Filesize

    8KB

  • memory/680-78-0x0000000077800000-0x0000000077802000-memory.dmp

    Filesize

    8KB

  • memory/680-55-0x00000000777D0000-0x00000000777D2000-memory.dmp

    Filesize

    8KB

  • memory/680-53-0x00000000777D0000-0x00000000777D2000-memory.dmp

    Filesize

    8KB

  • memory/680-52-0x00000000777C0000-0x00000000777C2000-memory.dmp

    Filesize

    8KB

  • memory/680-50-0x00000000777C0000-0x00000000777C2000-memory.dmp

    Filesize

    8KB

  • memory/680-48-0x00000000777C0000-0x00000000777C2000-memory.dmp

    Filesize

    8KB

  • memory/680-45-0x00000000777B0000-0x00000000777B2000-memory.dmp

    Filesize

    8KB

  • memory/680-43-0x00000000777B0000-0x00000000777B2000-memory.dmp

    Filesize

    8KB

  • memory/680-42-0x00000000777A0000-0x00000000777A2000-memory.dmp

    Filesize

    8KB

  • memory/680-40-0x00000000777A0000-0x00000000777A2000-memory.dmp

    Filesize

    8KB

  • memory/680-38-0x00000000777A0000-0x00000000777A2000-memory.dmp

    Filesize

    8KB

  • memory/680-35-0x0000000077790000-0x0000000077792000-memory.dmp

    Filesize

    8KB

  • memory/680-33-0x0000000077790000-0x0000000077792000-memory.dmp

    Filesize

    8KB

  • memory/680-77-0x00000000777F0000-0x00000000777F2000-memory.dmp

    Filesize

    8KB

  • memory/680-92-0x0000000077820000-0x0000000077822000-memory.dmp

    Filesize

    8KB

  • memory/680-95-0x0000000077830000-0x0000000077832000-memory.dmp

    Filesize

    8KB

  • memory/680-93-0x0000000077830000-0x0000000077832000-memory.dmp

    Filesize

    8KB

  • memory/680-90-0x0000000077820000-0x0000000077822000-memory.dmp

    Filesize

    8KB

  • memory/680-47-0x00000000777B0000-0x00000000777B2000-memory.dmp

    Filesize

    8KB

  • memory/680-87-0x0000000077810000-0x0000000077812000-memory.dmp

    Filesize

    8KB

  • memory/680-85-0x0000000077810000-0x0000000077812000-memory.dmp

    Filesize

    8KB

  • memory/680-83-0x0000000077810000-0x0000000077812000-memory.dmp

    Filesize

    8KB

  • memory/680-82-0x0000000077800000-0x0000000077802000-memory.dmp

    Filesize

    8KB

  • memory/680-80-0x0000000077800000-0x0000000077802000-memory.dmp

    Filesize

    8KB

  • memory/680-57-0x00000000777D0000-0x00000000777D2000-memory.dmp

    Filesize

    8KB

  • memory/680-75-0x00000000777F0000-0x00000000777F2000-memory.dmp

    Filesize

    8KB

  • memory/680-73-0x00000000777F0000-0x00000000777F2000-memory.dmp

    Filesize

    8KB

  • memory/680-72-0x000007FEFD6A0000-0x000007FEFD6A2000-memory.dmp

    Filesize

    8KB

  • memory/680-70-0x000007FEFD6A0000-0x000007FEFD6A2000-memory.dmp

    Filesize

    8KB

  • memory/680-67-0x000007FEFD690000-0x000007FEFD692000-memory.dmp

    Filesize

    8KB

  • memory/680-65-0x000007FEFD690000-0x000007FEFD692000-memory.dmp

    Filesize

    8KB

  • memory/680-62-0x00000000777E0000-0x00000000777E2000-memory.dmp

    Filesize

    8KB

  • memory/680-60-0x00000000777E0000-0x00000000777E2000-memory.dmp

    Filesize

    8KB

  • memory/680-58-0x00000000777E0000-0x00000000777E2000-memory.dmp

    Filesize

    8KB

  • memory/680-37-0x0000000077790000-0x0000000077792000-memory.dmp

    Filesize

    8KB

  • memory/832-183-0x000000001B590000-0x000000001B872000-memory.dmp

    Filesize

    2.9MB

  • memory/832-184-0x00000000026A0000-0x00000000026A8000-memory.dmp

    Filesize

    32KB

  • memory/1212-193-0x0000000000EC0000-0x0000000000EF4000-memory.dmp

    Filesize

    208KB

  • memory/1756-13-0x00000000000A0000-0x00000000000D2000-memory.dmp

    Filesize

    200KB

  • memory/2348-236-0x0000000000C70000-0x0000000000CA6000-memory.dmp

    Filesize

    216KB

  • memory/2516-238-0x00000000001A0000-0x00000000001D6000-memory.dmp

    Filesize

    216KB

  • memory/2736-27-0x00000000003B0000-0x00000000003E4000-memory.dmp

    Filesize

    208KB

  • memory/2876-32-0x0000000000D00000-0x0000000000D32000-memory.dmp

    Filesize

    200KB

  • memory/2884-177-0x0000000001E80000-0x0000000001E88000-memory.dmp

    Filesize

    32KB

  • memory/2884-176-0x000000001B660000-0x000000001B942000-memory.dmp

    Filesize

    2.9MB

  • memory/2924-1-0x0000000000B50000-0x0000000002536000-memory.dmp

    Filesize

    25.9MB

  • memory/2924-0-0x000007FEF5C73000-0x000007FEF5C74000-memory.dmp

    Filesize

    4KB

  • memory/3068-25-0x00000000012E0000-0x0000000001316000-memory.dmp

    Filesize

    216KB