Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
101s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 19:12
Behavioral task
behavioral1
Sample
36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe
Resource
win7-20241010-en
General
-
Target
36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe
-
Size
128KB
-
MD5
3657da33a177e630833f71ffb853c758
-
SHA1
96c5716ce5114c9aea92d924038e250e43aa2468
-
SHA256
36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4
-
SHA512
50cdaf14e580803cf28d0961054da165e8a79847b884523e905830fe831c3daa8b27926fe1d22d307800594720853c9b931d4c4bf503fe3e96702f8f5ba2919a
-
SSDEEP
3072:RUEcx5zHoPMVbUcPH1bUeQ78uD36dDJVJ6FY:RUHoPMVNVbH88i36dDJVI
Malware Config
Extracted
asyncrat
Venom Pwn3rzs' Edtition v6.0.1
V-lg60
37.48.64.102:4950
yawyrgpacvfvsfgbz
-
delay
1
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/4976-12-0x000000001C450000-0x000000001C572000-memory.dmp family_stormkitty -
Stormkitty family
-
resource yara_rule behavioral2/memory/4976-1-0x0000000000360000-0x0000000000386000-memory.dmp VenomRAT -
Venomrat family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4976 36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe 4976 36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe 4976 36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4976 36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4976 36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe"C:\Users\Admin\AppData\Local\Temp\36f9ad99219ec612306a35b8d69ead0cbd2792701e0599314c0fca7c035399e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4976