Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10cdnmain/Exela.exe
windows10-ltsc 2021-x64
10cdnmain/Exela.exe
windows11-21h2-x64
10Stub.pyc
windows10-ltsc 2021-x64
3Stub.pyc
windows11-21h2-x64
3cdnmain/chrome.exe
windows10-ltsc 2021-x64
10cdnmain/chrome.exe
windows11-21h2-x64
10cdnmain/cl...st.exe
windows10-ltsc 2021-x64
1cdnmain/cl...st.exe
windows11-21h2-x64
1cdnmain/ef.exe
windows10-ltsc 2021-x64
10cdnmain/ef.exe
windows11-21h2-x64
10cdnmain/libsodium.dll
windows10-ltsc 2021-x64
1cdnmain/libsodium.dll
windows11-21h2-x64
1cdnmain/sqlite3.dll
windows10-ltsc 2021-x64
1cdnmain/sqlite3.dll
windows11-21h2-x64
1cdnmain/vc...40.dll
windows10-ltsc 2021-x64
1cdnmain/vc...40.dll
windows11-21h2-x64
1cdnmain/verif.exe
windows10-ltsc 2021-x64
1cdnmain/verif.exe
windows11-21h2-x64
1Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250217-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250217-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10/03/2025, 16:59
Behavioral task
behavioral1
Sample
cdnmain/Exela.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
cdnmain/Exela.exe
Resource
win11-20250217-en
Behavioral task
behavioral3
Sample
Stub.pyc
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
Stub.pyc
Resource
win11-20250217-en
Behavioral task
behavioral5
Sample
cdnmain/chrome.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
cdnmain/chrome.exe
Resource
win11-20250217-en
Behavioral task
behavioral7
Sample
cdnmain/cloudflare_whitelist.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral8
Sample
cdnmain/cloudflare_whitelist.exe
Resource
win11-20250217-en
Behavioral task
behavioral9
Sample
cdnmain/ef.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral10
Sample
cdnmain/ef.exe
Resource
win11-20250217-en
Behavioral task
behavioral11
Sample
cdnmain/libsodium.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral12
Sample
cdnmain/libsodium.dll
Resource
win11-20250217-en
Behavioral task
behavioral13
Sample
cdnmain/sqlite3.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral14
Sample
cdnmain/sqlite3.dll
Resource
win11-20250218-en
Behavioral task
behavioral15
Sample
cdnmain/vcruntime140.dll
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral16
Sample
cdnmain/vcruntime140.dll
Resource
win11-20250217-en
Behavioral task
behavioral17
Sample
cdnmain/verif.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral18
Sample
cdnmain/verif.exe
Resource
win11-20250217-en
General
-
Target
cdnmain/ef.exe
-
Size
54KB
-
MD5
0ed9406036832e40f6ace06478acdf44
-
SHA1
9a3ca883ec34bdfd1c21c61c6ca6d03c5365fa6e
-
SHA256
452e3305df1bf06c79301b9b87de1ec82561a793c4ef4ea5a02803123891b9f6
-
SHA512
9de32c71a4657d3e9ebd01fd1d933fd44b23c99809bbd0c8c423dcf8436d8c3f81e390ec34df8fb2e5a3a28974c864750ceaeb65693c04b1c5a1f8134eca69a5
-
SSDEEP
1536:de/mS9oEXN9p7aNJahXy4zGuH4XlqJaAIT+7bqhyX9qZ:d+mSawsLawqGMolq07i7bqMX9W
Malware Config
Extracted
asyncrat
1.0.7
Default
2.58.56.179:2035
r4ttlesn4ke_ufog3f8u3egef978
-
delay
1
-
install
true
-
install_file
Chrome.exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral9/files/0x000c000000027d99-8.dat family_asyncrat -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1095212214-1383118828-1037266802-1000\Control Panel\International\Geo\Nation ef.exe Key value queried \REGISTRY\USER\S-1-5-21-1095212214-1383118828-1037266802-1000\Control Panel\International\Geo\Nation chrome.exe -
Executes dropped EXE 2 IoCs
pid Process 4556 chrome.exe 4292 Chrome.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 1 IoCs
pid Process 3184 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4144 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe 4556 chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4556 chrome.exe Token: SeDebugPrivilege 4292 Chrome.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2352 wrote to memory of 4556 2352 ef.exe 80 PID 2352 wrote to memory of 4556 2352 ef.exe 80 PID 4556 wrote to memory of 812 4556 chrome.exe 81 PID 4556 wrote to memory of 812 4556 chrome.exe 81 PID 4556 wrote to memory of 4580 4556 chrome.exe 83 PID 4556 wrote to memory of 4580 4556 chrome.exe 83 PID 812 wrote to memory of 4144 812 cmd.exe 85 PID 812 wrote to memory of 4144 812 cmd.exe 85 PID 4580 wrote to memory of 3184 4580 cmd.exe 86 PID 4580 wrote to memory of 3184 4580 cmd.exe 86 PID 4580 wrote to memory of 4292 4580 cmd.exe 87 PID 4580 wrote to memory of 4292 4580 cmd.exe 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdnmain\ef.exe"C:\Users\Admin\AppData\Local\Temp\cdnmain\ef.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\chrome.exe"C:\Users\Admin\AppData\Local\Temp\chrome.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "Chrome" /tr '"C:\Users\Admin\AppData\Roaming\Chrome.exe"' & exit3⤵
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "Chrome" /tr '"C:\Users\Admin\AppData\Roaming\Chrome.exe"'4⤵
- Scheduled Task/Job: Scheduled Task
PID:4144
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp1F0C.tmp.bat""3⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\system32\timeout.exetimeout 34⤵
- Delays execution with timeout.exe
PID:3184
-
-
C:\Users\Admin\AppData\Roaming\Chrome.exe"C:\Users\Admin\AppData\Roaming\Chrome.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4292
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
425B
MD5822f6384df6d1671168631e912dd7a4c
SHA1972aacac112d14ea63c9d33b57ecd402e67a5f19
SHA2565f50faf2e5bbac2ce5423530952c977e965d60dfb6920a5cce5a707bac630bc4
SHA5123c03b3c90b551c7febce56406b48e5e4022e7128bfd3a283ec0e3dd952575649af3428b514fb8a312358eb643d3a4f3f4f747a16c29b8863f5367fffe11a9fbf
-
Filesize
48KB
MD5560316acf1e4be6ee63f609da37e71b5
SHA15f22dcf7736356e24b92397162acb723010914fb
SHA25644d97fbdb694ca55e3beec4ec031ef5162018bdbaff6a968ac25a21e078511b0
SHA51238d185d48cf537162ef8302df31cdf723d7407765f21284492345cae914d38ec9e3a6cfee0080b5ff9ebef29f7ac54a505ea2e6fea5d65a60c4e6e1e67fb3361
-
Filesize
150B
MD5a6784cdb819521a8f09055a3d544342e
SHA1febac57d8d113ed844a146b00c920d0765102c1f
SHA256624234f636796229fa42dcf9a35cea3558451d81bab89ee28aa4a4964d2242e4
SHA512d9c09df4b0d2a3d5488d6e40af091084bad46c090602bcbba00d6a05b93bef10f13f0a95c8a3174fa9b3e485a6cfabe65edec68493d1de6c41a0b3017e16511b