Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
27/05/2024, 12:43
Static task
static1
Behavioral task
behavioral1
Sample
Sapphire.LITE.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Sapphire.LITE.exe
Resource
win10v2004-20240426-en
General
-
Target
Sapphire.LITE.exe
-
Size
1.2MB
-
MD5
1bbca3b8649901b50e00f8c0eca6482c
-
SHA1
398b31f87642bb25fd10be8f8936d0d8664e40a9
-
SHA256
26f5b4590ff9ca791118130b05363b3ad7a438c60cbc032fc812098943640976
-
SHA512
53ff755b549eff97802dcb91c193217db635c109b0be445d98f0e3deee1ff0a543b04f9e6690a45f0103a3523e033c2af9568454ea071b25940493530435c970
-
SSDEEP
24576:ichxoH6hdFETH5UCwIjcED7G2C/Q7xD0XVhEtmrC7l7bp8dXGI6T:ZoahdFETZhjcED7G2PxD0lLC7R18tg
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 26 discord.com 29 discord.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-711569230-3659488422-571408806-1000\{4A2E9AE0-7B08-4F2E-881A-2362A796279B} msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 4540 msedge.exe 4540 msedge.exe 3444 msedge.exe 3444 msedge.exe 4532 identity_helper.exe 4532 identity_helper.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2484 Sapphire.LITE.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 2484 Sapphire.LITE.exe 4540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe 4540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2484 wrote to memory of 4540 2484 Sapphire.LITE.exe 85 PID 2484 wrote to memory of 4540 2484 Sapphire.LITE.exe 85 PID 4540 wrote to memory of 4732 4540 msedge.exe 86 PID 4540 wrote to memory of 4732 4540 msedge.exe 86 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3784 4540 msedge.exe 87 PID 4540 wrote to memory of 3648 4540 msedge.exe 88 PID 4540 wrote to memory of 3648 4540 msedge.exe 88 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89 PID 4540 wrote to memory of 1544 4540 msedge.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\Sapphire.LITE.exe"C:\Users\Admin\AppData\Local\Temp\Sapphire.LITE.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.sapphire.ac/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbba9d46f8,0x7ffbba9d4708,0x7ffbba9d47183⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:23⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:83⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:13⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:13⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4640 /prefetch:13⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3744 /prefetch:83⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=4964 /prefetch:83⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:83⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,17900310788275031066,4564051858245586820,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5740 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b2a1398f937474c51a48b347387ee36a
SHA1922a8567f09e68a04233e84e5919043034635949
SHA2562dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6
SHA5124a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c
-
Filesize
152B
MD51ac52e2503cc26baee4322f02f5b8d9c
SHA138e0cee911f5f2a24888a64780ffdf6fa72207c8
SHA256f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4
SHA5127670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize840B
MD5a7ffbccac34d90526399147bdbc39c2d
SHA1ba69eb5749597ebaa07de3156add71926f8b0978
SHA256977129fb20f5783d32731cd691bc44d9c53190862f11c9fa55678ba28356d34f
SHA51293064bc8d702f4edce1adcfcbb0545a8d092cc531a0dfe34e91e79d78ef9fac5d433073652336f083fa1f976e37da20637fe6f14635b60727bbf6aba6a484035
-
Filesize
332B
MD56889c1448c4b04e0bdb2b7005b34806e
SHA156087ea67cbf16695dd0c1a9aeb1ccfc2de98cc3
SHA25624536a6bed37f868109efce6914cfe21027ae6cdea803f05b5912fb69f67a538
SHA512f38907ae9f99e4de3ea77ad1b6d37ad32a5111a33e48512597b0bd383fd3ac00048c177900b982a5196bd2b95db353df6fb18e577c5db8ae202a2f7eed9e990a
-
Filesize
5KB
MD55ee55c55b6978f1957247a5300ac4a79
SHA175251da4544564b7e5be5032083efeb5aa1302ac
SHA256e4ed947ab3a085f3b10d24eab6cc455edb80cf26e09b6a079e7b37b10cb45eba
SHA512e062056e17877dcd6b55fd2b1aa1b368ab6b788ca2248085c24d6f21956e07cbf40c5ef77d8058924e39196979ddd9c20e63d69cb56eb931a5a02cdb498a4bd6
-
Filesize
6KB
MD521dbea277ae65451064534a6865904cb
SHA14445912bcda23d64d821c327788529143b149f91
SHA25631a90d066c51f98cf35ba8ebb131f066a50ec8132c6ee7948449367e9a912288
SHA51265a70f26a82fb1ebb267e7915069453b886f3c5e820b2bedca8a2e4ac637f31e6f3d817ec2f01c91226977addda383fb5dd1ed31b22bf92cde33e62b75b770d2
-
Filesize
6KB
MD5ca9fdeaafd0aa5799fac77938ddc5b8e
SHA138ed4c8d744b3c199dfbc858378cc192dcaba890
SHA256927f2c1438424043928ab38e6f669d4357fc12b758879d726418852f3b66a4c7
SHA512431ed506e1b60eb5a0fa7f0485c6c8f0cca75cdb94938b5f5ac112d7f204947df0eb05c91480ab841d290bd577f8c6afafd94587163b9986ed0561312d651198
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53abf52175410ad7ddf79f21284ea78e6
SHA1207a0e523472768e92d0c457be33cf72fa43fc95
SHA2566ab415415732dfc0580ce9039ce79ef99629b0fa88e79a1c80b07f0237b48566
SHA512a723053b247b6f0f7aec4c3d0377e2b77a88690d10d3d67f537bd6596f43f3b271fb78718279f7be1b8148cc01e9f4b35ce16abbea3fc8d0222b28fb2807c65c
-
Filesize
11KB
MD54c5e05c2433c5d6f36b6dc12c95e0e3e
SHA1c2dc4d1be77f1f629d0106ee4218ebe5d471e1f6
SHA25623c5d6d41dd2856c87525c642246218111da9720be54b2ac6ea862a26a7e8952
SHA512d6ac53281d3f7dc40870c0304e9da9da419e99deef8f497eda614e33a390c448402715aba77a91880d53c99217dfdabb6198ba96552db8d9954e46c86eb62598