Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
100033f75804...e5.exe
windows7-x64
10033f75804...e5.exe
windows10-2004-x64
100ecd8a50b...ab.exe
windows7-x64
1000ecd8a50b...ab.exe
windows10-2004-x64
1007f66695f4...21.exe
windows7-x64
807f66695f4...21.exe
windows10-2004-x64
809e259cbe7...ee.exe
windows7-x64
1009e259cbe7...ee.exe
windows10-2004-x64
100c41a305e8...cd.exe
windows7-x64
80c41a305e8...cd.exe
windows10-2004-x64
80ca149e59a...32.exe
windows7-x64
70ca149e59a...32.exe
windows10-2004-x64
1010ebd229b7...09.exe
windows7-x64
710ebd229b7...09.exe
windows10-2004-x64
7170b3d1749...5a.exe
windows7-x64
8170b3d1749...5a.exe
windows10-2004-x64
81b812937c3...1a.exe
windows7-x64
101b812937c3...1a.exe
windows10-2004-x64
101c7facff8b...44.exe
windows7-x64
101c7facff8b...44.exe
windows10-2004-x64
101d5d209fb6...fc.exe
windows7-x64
71d5d209fb6...fc.exe
windows10-2004-x64
1020b9ae8a5a...ad.exe
windows7-x64
820b9ae8a5a...ad.exe
windows10-2004-x64
821aaf28e05...f4.exe
windows7-x64
1021aaf28e05...f4.exe
windows10-2004-x64
1022ea24b9b0...6c.exe
windows7-x64
322ea24b9b0...6c.exe
windows10-2004-x64
32646ec6c76...0a.exe
windows7-x64
102646ec6c76...0a.exe
windows10-2004-x64
82963197f54...71.exe
windows7-x64
102963197f54...71.exe
windows10-2004-x64
10Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 07:56
Static task
static1
Behavioral task
behavioral1
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0033f75804f1bdff0d0bd5153a6114c3757da40fa823dd18a5742373a905a3e5.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
00ecd8a50bb6f18b13df817d36962dd625cc98b05a90ef9f539c8506226790ab.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
07f66695f4dde786aabfdcb965764f4cc785308308a7d5b3d871373557b4e121.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
09e259cbe7adb2947fdbf6b556ab82948a320042b2d4738988ac756d5539bfee.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win7-20240729-en
Behavioral task
behavioral10
Sample
0c41a305e80960e4c7c2c890fd707429091d3bb87d5726ed7c13373d626e85cd.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0ca149e59a526c1811fcac3c14943acdbc43a3261af653670bc9e71436b1fc32.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
10ebd229b72489e6960490381681c51b84b6a0430cfc5fd556edae41b0871409.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
170b3d1749618a0f84e58913c4d799660fe29ca3b7f421b9eb42f54c54fba85a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
1c7facff8b5db7f2186d2574b32b72d5f00467e85f56189d461cec22b9b3b144.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
1d5d209fb69f3a9b4cb8799fb7be62b22df0fecee3a7ddd45d4504d5c2d311fc.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
20b9ae8a5ac2fee80a07e504d2a6be09d2be39055b349baf7c38813e26d13fad.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
21aaf28e05a6224b2a5b338a738ff9321a56ebc2babe6b194709f9a00fb97af4.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win7-20250207-en
Behavioral task
behavioral28
Sample
22ea24b9b0535d9687352b4a6208e299c4a64f79290c939f553b1eb9ec60706c.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
2646ec6c76057d721a872ba333ac65cd7d962fa27338923b8a2d18099ba0f00a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
2963197f5419c180c099f042b013a53a3ebe97928717a199872f73667f488471.exe
Resource
win10v2004-20250217-en
General
-
Target
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe
-
Size
347KB
-
MD5
5bffb8d7b5c57858b0e815d4b8de8af0
-
SHA1
9024405039522915bba1139bbbddbb396e167393
-
SHA256
1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a
-
SHA512
d2137bdd45e62705d09086c399013b71a5761ea8e3c8aacb556cca6471a27431a53b36f377109e44473724137114a068d59a136f4ad8b1e35ac3d5b92eea327c
-
SSDEEP
6144:YGTo8tqR6SuFSO86L/3NvZ12PbkOXJ/1v3D3Rl/ojdVhjAdHf:Rhq4FM6DvmVt1vz3Rl/ojdVhjAp
Malware Config
Extracted
asyncrat
0.5.7B
Default
46.183.220.52:6200
sirbanty.ddnsgeek.com:6200
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
true
-
install_file
SolidAudio.exe
-
install_folder
%Temp%
Signatures
-
Asyncrat family
-
Executes dropped EXE 3 IoCs
pid Process 1660 SolidAudio.exe 3068 SolidAudio.exe 2956 SolidAudio.exe -
Loads dropped DLL 3 IoCs
pid Process 2016 cmd.exe 1660 SolidAudio.exe 1660 SolidAudio.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2736 set thread context of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 1660 set thread context of 2956 1660 SolidAudio.exe 44 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolidAudio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SolidAudio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1900 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1724 schtasks.exe 1292 schtasks.exe 1452 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 1660 SolidAudio.exe 1660 SolidAudio.exe 1660 SolidAudio.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe Token: SeDebugPrivilege 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe Token: SeDebugPrivilege 1660 SolidAudio.exe Token: SeDebugPrivilege 2956 SolidAudio.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 2736 wrote to memory of 1724 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 31 PID 2736 wrote to memory of 1724 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 31 PID 2736 wrote to memory of 1724 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 31 PID 2736 wrote to memory of 1724 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 31 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2736 wrote to memory of 2440 2736 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 33 PID 2440 wrote to memory of 2528 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 34 PID 2440 wrote to memory of 2528 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 34 PID 2440 wrote to memory of 2528 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 34 PID 2440 wrote to memory of 2528 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 34 PID 2440 wrote to memory of 2016 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 36 PID 2440 wrote to memory of 2016 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 36 PID 2440 wrote to memory of 2016 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 36 PID 2440 wrote to memory of 2016 2440 1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe 36 PID 2528 wrote to memory of 1292 2528 cmd.exe 38 PID 2528 wrote to memory of 1292 2528 cmd.exe 38 PID 2528 wrote to memory of 1292 2528 cmd.exe 38 PID 2528 wrote to memory of 1292 2528 cmd.exe 38 PID 2016 wrote to memory of 1900 2016 cmd.exe 39 PID 2016 wrote to memory of 1900 2016 cmd.exe 39 PID 2016 wrote to memory of 1900 2016 cmd.exe 39 PID 2016 wrote to memory of 1900 2016 cmd.exe 39 PID 2016 wrote to memory of 1660 2016 cmd.exe 40 PID 2016 wrote to memory of 1660 2016 cmd.exe 40 PID 2016 wrote to memory of 1660 2016 cmd.exe 40 PID 2016 wrote to memory of 1660 2016 cmd.exe 40 PID 1660 wrote to memory of 1452 1660 SolidAudio.exe 41 PID 1660 wrote to memory of 1452 1660 SolidAudio.exe 41 PID 1660 wrote to memory of 1452 1660 SolidAudio.exe 41 PID 1660 wrote to memory of 1452 1660 SolidAudio.exe 41 PID 1660 wrote to memory of 3068 1660 SolidAudio.exe 43 PID 1660 wrote to memory of 3068 1660 SolidAudio.exe 43 PID 1660 wrote to memory of 3068 1660 SolidAudio.exe 43 PID 1660 wrote to memory of 3068 1660 SolidAudio.exe 43 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44 PID 1660 wrote to memory of 2956 1660 SolidAudio.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe"C:\Users\Admin\AppData\Local\Temp\1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRjAKJCvzE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFE0E.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\1b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a.exe"{path}"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "SolidAudio" /tr '"C:\Users\Admin\AppData\Local\Temp\SolidAudio.exe"' & exit3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "SolidAudio" /tr '"C:\Users\Admin\AppData\Local\Temp\SolidAudio.exe"'4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1292
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpD59.tmp.bat""3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\timeout.exetimeout 34⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:1900
-
-
C:\Users\Admin\AppData\Local\Temp\SolidAudio.exe"C:\Users\Admin\AppData\Local\Temp\SolidAudio.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\HRjAKJCvzE" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA303.tmp"5⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1452
-
-
C:\Users\Admin\AppData\Local\Temp\SolidAudio.exe"{path}"5⤵
- Executes dropped EXE
PID:3068
-
-
C:\Users\Admin\AppData\Local\Temp\SolidAudio.exe"{path}"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156B
MD5d1215c21171d54e1825e40d35b1a4bca
SHA19bf0abb76d8f5709d7f68e1012e1f6e3a83cdc02
SHA25638b4886109c45f93ce72e80bd38d75639b8c8d784fc63715145f5b1d7e387f6b
SHA512718a72773715b92739bae911db5b377d018d6f20dd42673de5026dd572e9575f64dc46108504b57fcb1532555a434dd45c912348834fa62fe32c67b47100343d
-
Filesize
1KB
MD595d1d3787c567e2c300828206efddad9
SHA1afa3aa770eb8df1abde76d79f0beb9eb6d8281a7
SHA25624a73f17b3547e93cc380d26e4ec5259051a9db2b2221745c430cd05f0651cbe
SHA512a03cbc9bf28690430156439e4fc47e659a998597db22baa5e588a75f18408f350fae76227c50625cc2d54dc4d3611645056e405e1b893e2b329e6fc1d6ffd26a
-
Filesize
347KB
MD55bffb8d7b5c57858b0e815d4b8de8af0
SHA19024405039522915bba1139bbbddbb396e167393
SHA2561b812937c39179ae1fbd25f82d70d98d3d718ded40c08357e4ec36a372cfba1a
SHA512d2137bdd45e62705d09086c399013b71a5761ea8e3c8aacb556cca6471a27431a53b36f377109e44473724137114a068d59a136f4ad8b1e35ac3d5b92eea327c