Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
Doc_16811806711348617673558987317572681097380136281.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Doc_16811806711348617673558987317572681097380136281.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Doc_16811806711348617673558987317572681097380136281.exe
Resource
win7-20240903-en
General
-
Target
Doc_16811806711348617673558987317572681097380136281.exe
-
Size
1.1MB
-
MD5
f5c33c21056d3ef62172fc876faad063
-
SHA1
fb56e9043f19afdf49c61063ba30fe0ad72daf07
-
SHA256
655c37dadba41474eb3447ff8b23e064e760013e7c84503f9eb25d21f8bd3ec3
-
SHA512
aa29db436c336847d04b7317a1d8a4cd5c8335db1d2235fb3bb685a7907fcdd8cec8eca8f2818bdc8e1e61c5bf265978e692ffeef766a962a9b7406447afd3c6
-
SSDEEP
24576:PMjhbhcgdHRQp+DKjHfEhZQntmXft63I3i43eOooZw:CpeuHhZ7Q3q1Zw
Malware Config
Extracted
asyncrat
SapphireRAT v3.2.0
iafinitd18jw3jdvhy4nhv.duckdns.org:15348
iafinitd18jw3jdvhy4nhv.duckdns.org:35981
iafinitd18jw3jdvhy4nhv.duckdns.org:42369
cpyzzyzerqwbqvpuh
-
delay
1
-
install
false
-
install_file
%File%
-
install_folder
%Folder%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/4636-81-0x0000000002990000-0x00000000029A2000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation Doc_16811806711348617673558987317572681097380136281.tmp -
Executes dropped EXE 2 IoCs
pid Process 2496 Doc_16811806711348617673558987317572681097380136281.tmp 3080 Doc_16811806711348617673558987317572681097380136281.tmp -
Loads dropped DLL 4 IoCs
pid Process 4656 regsvr32.exe 4636 regsvr32.exe 1776 regsvr32.EXE 4672 regsvr32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to execute payload.
pid Process 4752 powershell.exe 4256 powershell.exe 4904 powershell.exe 4108 powershell.exe 1200 PowerShell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.tmp -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3080 Doc_16811806711348617673558987317572681097380136281.tmp 3080 Doc_16811806711348617673558987317572681097380136281.tmp 4636 regsvr32.exe 4636 regsvr32.exe 4752 powershell.exe 4752 powershell.exe 1200 PowerShell.exe 1200 PowerShell.exe 4636 regsvr32.exe 4636 regsvr32.exe 4256 powershell.exe 4256 powershell.exe 4636 regsvr32.exe 4636 regsvr32.exe 4636 regsvr32.exe 1776 regsvr32.EXE 1776 regsvr32.EXE 4904 powershell.exe 4904 powershell.exe 1776 regsvr32.EXE 1776 regsvr32.EXE 4636 regsvr32.exe 4636 regsvr32.exe 4636 regsvr32.exe 4672 regsvr32.EXE 4672 regsvr32.EXE 4108 powershell.exe 4108 powershell.exe 4672 regsvr32.EXE 4672 regsvr32.EXE 4636 regsvr32.exe 4636 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4752 powershell.exe Token: SeIncreaseQuotaPrivilege 4752 powershell.exe Token: SeSecurityPrivilege 4752 powershell.exe Token: SeTakeOwnershipPrivilege 4752 powershell.exe Token: SeLoadDriverPrivilege 4752 powershell.exe Token: SeSystemProfilePrivilege 4752 powershell.exe Token: SeSystemtimePrivilege 4752 powershell.exe Token: SeProfSingleProcessPrivilege 4752 powershell.exe Token: SeIncBasePriorityPrivilege 4752 powershell.exe Token: SeCreatePagefilePrivilege 4752 powershell.exe Token: SeBackupPrivilege 4752 powershell.exe Token: SeRestorePrivilege 4752 powershell.exe Token: SeShutdownPrivilege 4752 powershell.exe Token: SeDebugPrivilege 4752 powershell.exe Token: SeSystemEnvironmentPrivilege 4752 powershell.exe Token: SeRemoteShutdownPrivilege 4752 powershell.exe Token: SeUndockPrivilege 4752 powershell.exe Token: SeManageVolumePrivilege 4752 powershell.exe Token: 33 4752 powershell.exe Token: 34 4752 powershell.exe Token: 35 4752 powershell.exe Token: 36 4752 powershell.exe Token: SeDebugPrivilege 1200 PowerShell.exe Token: SeIncreaseQuotaPrivilege 1200 PowerShell.exe Token: SeSecurityPrivilege 1200 PowerShell.exe Token: SeTakeOwnershipPrivilege 1200 PowerShell.exe Token: SeLoadDriverPrivilege 1200 PowerShell.exe Token: SeSystemProfilePrivilege 1200 PowerShell.exe Token: SeSystemtimePrivilege 1200 PowerShell.exe Token: SeProfSingleProcessPrivilege 1200 PowerShell.exe Token: SeIncBasePriorityPrivilege 1200 PowerShell.exe Token: SeCreatePagefilePrivilege 1200 PowerShell.exe Token: SeBackupPrivilege 1200 PowerShell.exe Token: SeRestorePrivilege 1200 PowerShell.exe Token: SeShutdownPrivilege 1200 PowerShell.exe Token: SeDebugPrivilege 1200 PowerShell.exe Token: SeSystemEnvironmentPrivilege 1200 PowerShell.exe Token: SeRemoteShutdownPrivilege 1200 PowerShell.exe Token: SeUndockPrivilege 1200 PowerShell.exe Token: SeManageVolumePrivilege 1200 PowerShell.exe Token: 33 1200 PowerShell.exe Token: 34 1200 PowerShell.exe Token: 35 1200 PowerShell.exe Token: 36 1200 PowerShell.exe Token: SeIncreaseQuotaPrivilege 1200 PowerShell.exe Token: SeSecurityPrivilege 1200 PowerShell.exe Token: SeTakeOwnershipPrivilege 1200 PowerShell.exe Token: SeLoadDriverPrivilege 1200 PowerShell.exe Token: SeSystemProfilePrivilege 1200 PowerShell.exe Token: SeSystemtimePrivilege 1200 PowerShell.exe Token: SeProfSingleProcessPrivilege 1200 PowerShell.exe Token: SeIncBasePriorityPrivilege 1200 PowerShell.exe Token: SeCreatePagefilePrivilege 1200 PowerShell.exe Token: SeBackupPrivilege 1200 PowerShell.exe Token: SeRestorePrivilege 1200 PowerShell.exe Token: SeShutdownPrivilege 1200 PowerShell.exe Token: SeDebugPrivilege 1200 PowerShell.exe Token: SeSystemEnvironmentPrivilege 1200 PowerShell.exe Token: SeRemoteShutdownPrivilege 1200 PowerShell.exe Token: SeUndockPrivilege 1200 PowerShell.exe Token: SeManageVolumePrivilege 1200 PowerShell.exe Token: 33 1200 PowerShell.exe Token: 34 1200 PowerShell.exe Token: 35 1200 PowerShell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3080 Doc_16811806711348617673558987317572681097380136281.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4636 regsvr32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3784 wrote to memory of 2496 3784 Doc_16811806711348617673558987317572681097380136281.exe 86 PID 3784 wrote to memory of 2496 3784 Doc_16811806711348617673558987317572681097380136281.exe 86 PID 3784 wrote to memory of 2496 3784 Doc_16811806711348617673558987317572681097380136281.exe 86 PID 2496 wrote to memory of 2116 2496 Doc_16811806711348617673558987317572681097380136281.tmp 88 PID 2496 wrote to memory of 2116 2496 Doc_16811806711348617673558987317572681097380136281.tmp 88 PID 2496 wrote to memory of 2116 2496 Doc_16811806711348617673558987317572681097380136281.tmp 88 PID 2116 wrote to memory of 3080 2116 Doc_16811806711348617673558987317572681097380136281.exe 89 PID 2116 wrote to memory of 3080 2116 Doc_16811806711348617673558987317572681097380136281.exe 89 PID 2116 wrote to memory of 3080 2116 Doc_16811806711348617673558987317572681097380136281.exe 89 PID 3080 wrote to memory of 4656 3080 Doc_16811806711348617673558987317572681097380136281.tmp 90 PID 3080 wrote to memory of 4656 3080 Doc_16811806711348617673558987317572681097380136281.tmp 90 PID 3080 wrote to memory of 4656 3080 Doc_16811806711348617673558987317572681097380136281.tmp 90 PID 4656 wrote to memory of 4636 4656 regsvr32.exe 91 PID 4656 wrote to memory of 4636 4656 regsvr32.exe 91 PID 4636 wrote to memory of 4752 4636 regsvr32.exe 92 PID 4636 wrote to memory of 4752 4636 regsvr32.exe 92 PID 4636 wrote to memory of 1200 4636 regsvr32.exe 95 PID 4636 wrote to memory of 1200 4636 regsvr32.exe 95 PID 4636 wrote to memory of 4256 4636 regsvr32.exe 97 PID 4636 wrote to memory of 4256 4636 regsvr32.exe 97 PID 1776 wrote to memory of 4904 1776 regsvr32.EXE 116 PID 1776 wrote to memory of 4904 1776 regsvr32.EXE 116 PID 4672 wrote to memory of 4108 4672 regsvr32.EXE 120 PID 4672 wrote to memory of 4108 4672 regsvr32.EXE 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\is-LGMIB.tmp\Doc_16811806711348617673558987317572681097380136281.tmp"C:\Users\Admin\AppData\Local\Temp\is-LGMIB.tmp\Doc_16811806711348617673558987317572681097380136281.tmp" /SL5="$8024A,695232,190976,C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\is-HAQMA.tmp\Doc_16811806711348617673558987317572681097380136281.tmp"C:\Users\Admin\AppData\Local\Temp\is-HAQMA.tmp\Doc_16811806711348617673558987317572681097380136281.tmp" /SL5="$11016A,695232,190976,C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe" /VERYSILENT4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\8dxgi.ocx"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\system32\regsvr32.exe/s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\8dxgi.ocx"6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -NoProfile -NonInteractive -Command -7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
-
-
-
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\8dxgi.ocx"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\8dxgi.ocx"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4108
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD512c844ed8342738dacc6eb0072c43257
SHA1b7f2f9e3ec4aaf5e2996720f129cd64887ac91d7
SHA2562afeb7db4e46d3c1524512a73448e9cd0121deec761d8aa54fa9fe8b56df7519
SHA512e3de9103533a69cccc36cd377297ba3ec9bd7a1159e1349d2cc01ab66a88a5a82b4ee3af61fab586a0cdfab915c7408735439fd0462c5c2cc2c787cb0765766a
-
Filesize
1KB
MD5c8c29f1f588816cb69fcebf642891720
SHA1968d91f771b5e235c91952025509479c4456b44e
SHA2562e1d2b0a86abe46d40843dbc522f6c9891671b21c1ac61e21d32f7245a93eb8b
SHA5126b19696757654762ec551388c04142d4404892314c3e8a811b3260834dd6110b57be9aa4a0497ff579a4936c91cbdfbf7a938f676ee24e7476ecdd1b668cac3a
-
Filesize
1KB
MD5f9c1bdaf442de98db929dbbffe07f50a
SHA1f3c153ec59bd6a56b1041a7fa464621fe7fc59bb
SHA256dd496968153718a44063dbc4e9662fedb2e872a53965f22944caa1358121a0aa
SHA5122349fba651e63c2f45b16d2f2b7739afb6d7f4fa5625d9797733c4a15a827a5a344388de704f2d8326a442b75cbbb2841997372592b9bd188e2685e76ec311b4
-
Filesize
1KB
MD5d876732bbd3f6c9cf9e2be236480e367
SHA18f2dd87515f7bcf62cc89a8a27cc4fa7817e0823
SHA256a4cea038e351c82952d795d84b29fc3e92680560d881bb86fe9dfbc4658dd9d0
SHA512375217306f3de9bf02548db09efba9065b84314a1ddecba022613f9502a3302c3e7a800561253c8a2b6bfade0f5f8dd5c5a1ad4e58e45c613965c4564bfb14ab
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\is-LGMIB.tmp\Doc_16811806711348617673558987317572681097380136281.tmp
Filesize1.2MB
MD55824259f69c4ece6cc28a81c9dec3abe
SHA16c4d89700e5c396407ec074331a6028e90a21ba4
SHA25625d874689683f19a474590bc869bb9abcdc7472393fc57344f1a24bda05a4fc0
SHA5120f19b9aeda82acab6d2c48612b30ff3f1d533d033dfac011c5c81c113f0139a8cc99a756b2105df334fdcd02cf38b16ef79ccc002ae1eff096fa4119d0273477
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.2MB
MD58489f0b3c714542bd3aba532a16728ba
SHA13e51def0437bf4465a1852ec2148e401fc999fd3
SHA256d1ddcd8b4c506f3af24f6ee63209de1342b1a5b29a73d8baadfea8d087daf940
SHA512721cd16e7f7a9bb0a020f3f2849aa1f3e7de4abf1db1f7da307fab9a6b74d8d9db52353a7c5b988fe300bc589f218d81513ad726d7f6cba078b55cb009d60a7c