Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 01:48
Static task
static1
Behavioral task
behavioral1
Sample
7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe
Resource
win7-20240729-en
General
-
Target
7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe
-
Size
9.0MB
-
MD5
c6e2b34b10109eebc3949f470129d332
-
SHA1
42549d7f961cbd2797a1386a3687b7e09fd7a98f
-
SHA256
7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c
-
SHA512
485f4e81fdd9562fbc38ce309bf07a9e379761bbd1db15f3a0e5f56371eafe70ee644529205cb4d4967f17071d94006b6808ef0c911f8d767d6f825fa11bc710
-
SSDEEP
49152:NYWurNFmASdq+juphCxBBibfVG2UoLPKJepsSi7yuA84UMmbQpBo1f71F+fDDisV:NeNF
Malware Config
Extracted
asyncrat
0.5.7B
Default
pydjnzwlm.localto.net:8472
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000200000001e732-130.dat family_asyncrat -
Checks computer location settings 2 TTPs 10 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmaya4.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmayaaaa2.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation 7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation LocalSIsGKmIjDK.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmaya9.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmaya8.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmaya7.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmaya5.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmayaaaa3.exe Key value queried \REGISTRY\USER\S-1-5-21-1874072718-2205492803-118941907-1000\Control Panel\International\Geo\Nation yapmaya6.exe -
Executes dropped EXE 10 IoCs
pid Process 3844 LocalSIsGKmIjDK.exe 2404 yapmaya9.exe 2980 yapmaya8.exe 2336 yapmaya7.exe 4108 yapmaya6.exe 2528 yapmaya5.exe 4592 yapmaya4.exe 4580 yapmayaaaa3.exe 2272 yapmayaaaa2.exe 3800 yapmayaaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LocalSIsGKmIjDK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmaya9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmaya8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmaya5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmayaaaa2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmayaaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmaya7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmaya6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmaya4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yapmayaaaa3.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3356 wrote to memory of 3844 3356 7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe 88 PID 3356 wrote to memory of 3844 3356 7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe 88 PID 3356 wrote to memory of 3844 3356 7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe 88 PID 3844 wrote to memory of 2404 3844 LocalSIsGKmIjDK.exe 89 PID 3844 wrote to memory of 2404 3844 LocalSIsGKmIjDK.exe 89 PID 3844 wrote to memory of 2404 3844 LocalSIsGKmIjDK.exe 89 PID 2404 wrote to memory of 2980 2404 yapmaya9.exe 90 PID 2404 wrote to memory of 2980 2404 yapmaya9.exe 90 PID 2404 wrote to memory of 2980 2404 yapmaya9.exe 90 PID 2980 wrote to memory of 2336 2980 yapmaya8.exe 93 PID 2980 wrote to memory of 2336 2980 yapmaya8.exe 93 PID 2980 wrote to memory of 2336 2980 yapmaya8.exe 93 PID 2336 wrote to memory of 4108 2336 yapmaya7.exe 96 PID 2336 wrote to memory of 4108 2336 yapmaya7.exe 96 PID 2336 wrote to memory of 4108 2336 yapmaya7.exe 96 PID 4108 wrote to memory of 2528 4108 yapmaya6.exe 97 PID 4108 wrote to memory of 2528 4108 yapmaya6.exe 97 PID 4108 wrote to memory of 2528 4108 yapmaya6.exe 97 PID 2528 wrote to memory of 4592 2528 yapmaya5.exe 98 PID 2528 wrote to memory of 4592 2528 yapmaya5.exe 98 PID 2528 wrote to memory of 4592 2528 yapmaya5.exe 98 PID 4592 wrote to memory of 4580 4592 yapmaya4.exe 99 PID 4592 wrote to memory of 4580 4592 yapmaya4.exe 99 PID 4592 wrote to memory of 4580 4592 yapmaya4.exe 99 PID 4580 wrote to memory of 2272 4580 yapmayaaaa3.exe 101 PID 4580 wrote to memory of 2272 4580 yapmayaaaa3.exe 101 PID 4580 wrote to memory of 2272 4580 yapmayaaaa3.exe 101 PID 2272 wrote to memory of 3800 2272 yapmayaaaa2.exe 102 PID 2272 wrote to memory of 3800 2272 yapmayaaaa2.exe 102 PID 2272 wrote to memory of 3800 2272 yapmayaaaa2.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe"C:\Users\Admin\AppData\Local\Temp\7bddd8edf64a31b1eed5498d9b87a31e091e8ca494965b23e0f320b994540f1c.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\LocalSIsGKmIjDK.exe"C:\Users\Admin\AppData\LocalSIsGKmIjDK.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya9.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya8.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya8.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya7.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya7.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya6.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya6.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya5.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya5.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya4.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmaya4.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmayaaaa3.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmayaaaa3.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmayaaaa2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmayaaaa2.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmayaaa.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\yapmayaaa.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3800
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8.7MB
MD5a1bb98b19542315849784d31316c8caa
SHA191534237e04fb32b094fee643bae15c4d5350c56
SHA2560e9e9d71d33888e475260d9447198b85136a8112ca8fad7636ee8e5d682fb86d
SHA51271f3be1f115f2d6c2b9085f1e7dbedc379d9cf8c2ce194a6a8f0773797f0e25bbeca89e3a5dbda1d7a2f9d583fc749a1ce7bbdaaf0313fee4c0ff9fc3ea0df75
-
Filesize
774B
MD5fc93eb9acb036dc0adcb7e9203deae84
SHA1f6180e425e36b03252e18d9edb38c853a0546226
SHA2568da330d49f43e46c3c34a7283f168ab399a37280b490503d7e7ca8ff34eaddae
SHA5128ed8c6f1199da12f71819be099b2f129eced45e27e7bd7e1efbb07b09c7102bd31aaa9c39de85c9a583963b9331248d53d76eec0eb2b8ba7173ab0fdef25a620
-
Filesize
1.0MB
MD5c90aef7e6df6038f2f23cd2e1d0fb58c
SHA1b99029001b08363d58decd4ffcda77da6fbe9e21
SHA2564df6eba6f169816234767390297d6c7245fca8e9634f4f5ec9fb2c1ca739b665
SHA512bd8a2e67963b0f84a10f2f3df96de7b18fed99aecafd26e1606540dac002903b03570543b60edece7d56fcc5b31098edb48fcd3ae61f46a0ac753cefad29c785
-
Filesize
1.6MB
MD5f3a45f3cdaeb7b6526501350554594d2
SHA13c57a0fb28bf2d09113d61b47e9c824333243f9d
SHA256c6d248125ce8228aa3f24d630fb7794f6b6ce62dc595d7803725866e5109ab87
SHA512379757ab1283649afd8615cbb8004e8c8465f6ffd2f5e449ad5c648d5949430fa39fe762cd5a936418aa9a656ff44fbbfd6959ae8ab09031c9e51df9241aff69
-
Filesize
2.3MB
MD586aa34234e15ed802c7c22eed1dc9ca0
SHA1de7183058c5991ab1b65a93cb1728543acb3d6e4
SHA25682493fd6e1084725cd70680a84cf1d076d18aaf7fb2f67b228023772ce890e3a
SHA51227149943511769b9b120ff4b5dc2301a8e5ea9888c19a1cddf64e119773e040cc0ea09c77aa5e0e96fef3984716d6d18858f3de4fcc7f1fb95ff111e2a40dd9b
-
Filesize
3.3MB
MD5bcdbd52ddfe4981f11e6ecaded4d54b2
SHA1e2c17036349e821f32f04c28514aebc4e541de8c
SHA2564908d812aa13e931a2700441740d7d30bc9969c793290b0fde3de404527ae0c5
SHA512bb7d5d567b15df4f500dfdd31c95b88f8a2092b67564536d0b25187a8f39d6566e879c846c853c2f05c6bba5420c3ea91f624bcd1c57eeae422dd802d30864b0
-
Filesize
4.6MB
MD587cf3db15ce64b9b208b7d3e7cba694b
SHA1d6082cf0ba9ef633f6974d450ad2be5abf368bd3
SHA25689a8b14f093b2a2f2ab5d2b23119d8678b20b22157dd951de2a92326532557d9
SHA512b1970f32b31d3969fb0e354eb1b69c0aa879b206ecf97cce24f9fd0bc098d6537e41e7e2d637bb84550d31c3c803086425956a0bb809251cc19c794e83c29907
-
Filesize
6.3MB
MD5bf36e6187212872f3f29f2aeb59b5b86
SHA1c1421939ba37d59b69d5e6e599245fd42e01c4e9
SHA2560f83abd9b5c1991f9600431c31ea962336341e5f78c2a871eef00bee51f7cdda
SHA512550c56c89c3525b91d4f44a6c6cbecd25f3f85de99981a87a0a5d4a8135197975b50049587f5952598959732bf7d05e7cea18e668c32a6a647fda00b23b43212
-
Filesize
45KB
MD5db6ded982f65a66b11d87d14c2b92725
SHA1e3f699244abc65f6d0987340fe175e1fa94c0275
SHA256689f05d04a7b10fade6a297386a4477423d524bbb9672bc5f15ec0d1b08cbbb8
SHA512519e0837f01c4cc057c0e4e8b11a106f5b036cf83734d484b13c4c9f99ef029f03bd46b31194899736327a5b5981c2e091bc7f7cb9326ea3f1a621ac8f37a4a7
-
Filesize
283KB
MD56dcc316b65b326e7df1d08e5625ee2e6
SHA13f4fceae7968fee261550792a2631797a85fc23b
SHA256e327db58ab491ae6480cf86febffb168cad44d5edc8809b6916477461b211284
SHA51243b36c7487e5347c61ca182e769104326a8fd7913918463afdafd4887796b0d155550ff7ef3341837a27484839f31ae0ce9f8ae5662fd0a2a8364c55dff996f5
-
Filesize
601KB
MD5fb6590c1b6b7e3c860532dad867aeb1d
SHA1f02f11db454bb25163a8e8810557d2ce8386f158
SHA2564408fb6b99f90760639476f318e13d8b43b6bc96ada53aa423d4db04e70161cf
SHA5122a78f1d7ef734ebb38c3b0e30a4f86109ec69d517ee2c4fa42d76432fceada2099b3b915865fc32133bf561f19fcc21f06d624d879cc6873459c5c8733bc64ef