Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    291s
  • max time network
    298s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2025, 15:27

General

  • Target

    Infected.exe

  • Size

    63KB

  • MD5

    83a8b226bcdf74373ded0f465220c861

  • SHA1

    0a04b14ca442073e1aa5f18d7b3c87bc7126eea9

  • SHA256

    612e431982c6d73fe3bfdf91ab00670282bf4c721055bfa4712e489a4165ecfe

  • SHA512

    3f35b9f52e7c1f3dc25b8c9efbf833ecbeb66fb551f20848feb735ceb6f57add20342c6398d7e62578ad54d2c2887169ff6fe660700be2d50c012141616b0fc4

  • SSDEEP

    768:Qv0M2UM/978aQC8A+XjlazcBRL5JTk1+T4KSBGHmDbD/ph0oXL0KXuSu0dpqKYhg:b1/k/dSJYUbdh9vJu0dpqKmY7

Malware Config

Extracted

Family

asyncrat

Botnet

Default

C2

127.0.0.1:3111

127.0.0.1:51413

paul-nw.gl.at.ply.gg:3111

paul-nw.gl.at.ply.gg:51413

Attributes
  • delay

    1

  • install

    false

  • install_folder

    %AppData%

aes.plain

Signatures

  • AsyncRat

    AsyncRAT is designed to remotely monitor and control other computers written in C#.

  • Asyncrat family
  • Stealerium

    An open source info stealer written in C# first seen in May 2022.

  • Stealerium family
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 3 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Looks up geolocation information via web service

    Uses a legitimate geolocation service to find the infected system's geolocation info.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Infected.exe
    "C:\Users\Admin\AppData\Local\Temp\Infected.exe"
    1⤵
    • Accesses Microsoft Outlook profiles
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • outlook_office_path
    • outlook_win_path
    PID:4392
    • C:\Windows\SYSTEM32\cmd.exe
      "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
      2⤵
      • System Network Configuration Discovery: Wi-Fi Discovery
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:2060
        • C:\Windows\system32\netsh.exe
          netsh wlan show profile
          3⤵
          • Event Triggered Execution: Netsh Helper DLL
          • System Network Configuration Discovery: Wi-Fi Discovery
          PID:5540
        • C:\Windows\system32\findstr.exe
          findstr All
          3⤵
            PID:1756
        • C:\Windows\SYSTEM32\cmd.exe
          "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1644
          • C:\Windows\system32\chcp.com
            chcp 65001
            3⤵
              PID:1836
            • C:\Windows\system32\netsh.exe
              netsh wlan show networks mode=bssid
              3⤵
              • Event Triggered Execution: Netsh Helper DLL
              PID:5796

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\a6d277597c96762ede77823362c467c1\Admin@ALDSPQOO_en-US\Browsers\Mozilla\Firefox\Bookmarks.txt

          Filesize

          81B

          MD5

          ea511fc534efd031f852fcf490b76104

          SHA1

          573e5fa397bc953df5422abbeb1a52bf94f7cf00

          SHA256

          e5fe7f327ae62df007bd1117aa7f522dbbcd371ec67953f66d786424cb1d7995

          SHA512

          f7d8e575a2332b0fbd491b5e092b7ed6b0942a5165557fcc5d215d873b05103aa6ba01843133871c1c7ac81b10182a15895be49885c98d1a379dd55f88004fae

        • C:\Users\Admin\AppData\Local\a6d277597c96762ede77823362c467c1\Admin@ALDSPQOO_en-US\System\Process.txt

          Filesize

          4KB

          MD5

          52a203777874760764cf3486734a2370

          SHA1

          0877a933838bd41840797f8c8df063326cabf91e

          SHA256

          3403793dc5285e1b8f4efaacf8be6f6aa6f93974fb2b886d0b33d92947302840

          SHA512

          77a5174409e475cb8073c091591d2636505acb23e126cde9c4c54fdca5f3200878b55638a3ae444656949216eaab74b4abfaf0bfd712470a8294b6fdb61bf65a

        • C:\Users\Admin\AppData\Local\a6d277597c96762ede77823362c467c1\Admin@ALDSPQOO_en-US\System\Process.txt

          Filesize

          807B

          MD5

          5aa87dee56e18575bc58fcdcdabf9331

          SHA1

          5bd776154ca032c8fde2e62ef850492d28b28e91

          SHA256

          cd3c2a533e0f4f7afbbeb3a300b47298cf79ad8f59eedadf7304bbd8910b0082

          SHA512

          d39bdaa6aa31978399435f4da098db125068ddfb83fc6785830feb9a86fd8746f09e06db19e646e76241cdf051eb92bdf738b25a5f2e3d65cc598208600d7962

        • C:\Users\Admin\AppData\Local\a6d277597c96762ede77823362c467c1\Admin@ALDSPQOO_en-US\System\Process.txt

          Filesize

          1KB

          MD5

          4731a438570a84860b9fa8afaada6cfd

          SHA1

          321b92a4d15599e70dc41edfab9517c36df63aae

          SHA256

          44e2d7c4cfb2f89bbf9324e6c3f43602f6a8d948f3408c0d1f91bc7785a3b5bc

          SHA512

          5509540a533a9682044949a038bbc35e01bb7522c7e3a4212b8f4afbf242f3994b7dba1f3afb4bfb2613d8bcb99a40f3f9a2b0ef35d463c5e1ae1ec4dad13116

        • memory/4392-16-0x00000000012B0000-0x00000000012BA000-memory.dmp

          Filesize

          40KB

        • memory/4392-4-0x00007FF915DC3000-0x00007FF915DC5000-memory.dmp

          Filesize

          8KB

        • memory/4392-6-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-7-0x000000001D650000-0x000000001D6C6000-memory.dmp

          Filesize

          472KB

        • memory/4392-8-0x0000000002C00000-0x0000000002C34000-memory.dmp

          Filesize

          208KB

        • memory/4392-9-0x0000000002C50000-0x0000000002C6E000-memory.dmp

          Filesize

          120KB

        • memory/4392-10-0x0000000002DA0000-0x0000000002DBC000-memory.dmp

          Filesize

          112KB

        • memory/4392-11-0x000000001D980000-0x000000001DB08000-memory.dmp

          Filesize

          1.5MB

        • memory/4392-1-0x0000000000AC0000-0x0000000000AD6000-memory.dmp

          Filesize

          88KB

        • memory/4392-5-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-3-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-2-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-150-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-151-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-154-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-164-0x000000001DF10000-0x000000001DF8A000-memory.dmp

          Filesize

          488KB

        • memory/4392-0-0x00007FF915DC3000-0x00007FF915DC5000-memory.dmp

          Filesize

          8KB

        • memory/4392-199-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-200-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB

        • memory/4392-201-0x00007FF915DC0000-0x00007FF916881000-memory.dmp

          Filesize

          10.8MB