Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
172s -
max time network
179s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 14:23
Static task
static1
Behavioral task
behavioral1
Sample
Doc_16811806711348617673558987317572681097380136281.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Doc_16811806711348617673558987317572681097380136281.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
Doc_16811806711348617673558987317572681097380136281.exe
Resource
win7-20240903-en
General
-
Target
Doc_16811806711348617673558987317572681097380136281.exe
-
Size
1.1MB
-
MD5
f5c33c21056d3ef62172fc876faad063
-
SHA1
fb56e9043f19afdf49c61063ba30fe0ad72daf07
-
SHA256
655c37dadba41474eb3447ff8b23e064e760013e7c84503f9eb25d21f8bd3ec3
-
SHA512
aa29db436c336847d04b7317a1d8a4cd5c8335db1d2235fb3bb685a7907fcdd8cec8eca8f2818bdc8e1e61c5bf265978e692ffeef766a962a9b7406447afd3c6
-
SSDEEP
24576:PMjhbhcgdHRQp+DKjHfEhZQntmXft63I3i43eOooZw:CpeuHhZ7Q3q1Zw
Malware Config
Extracted
asyncrat
SapphireRAT v3.2.0
iafinitd18jw3jdvhy4nhv.duckdns.org:15348
iafinitd18jw3jdvhy4nhv.duckdns.org:35981
iafinitd18jw3jdvhy4nhv.duckdns.org:42369
cpyzzyzerqwbqvpuh
-
delay
1
-
install
false
-
install_file
%File%
-
install_folder
%Folder%
Signatures
-
Asyncrat family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral4/memory/1916-81-0x0000000002210000-0x0000000002222000-memory.dmp family_asyncrat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000\Control Panel\International\Geo\Nation Doc_16811806711348617673558987317572681097380136281.tmp -
Executes dropped EXE 2 IoCs
pid Process 3348 Doc_16811806711348617673558987317572681097380136281.tmp 3600 Doc_16811806711348617673558987317572681097380136281.tmp -
Loads dropped DLL 4 IoCs
pid Process 1356 regsvr32.exe 1916 regsvr32.exe 1960 regsvr32.EXE 5028 regsvr32.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 5056 PowerShell.exe 5044 powershell.exe 2212 powershell.exe 1668 powershell.exe 4572 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Doc_16811806711348617673558987317572681097380136281.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 3600 Doc_16811806711348617673558987317572681097380136281.tmp 3600 Doc_16811806711348617673558987317572681097380136281.tmp 1916 regsvr32.exe 1916 regsvr32.exe 4572 powershell.exe 4572 powershell.exe 5056 PowerShell.exe 5056 PowerShell.exe 1916 regsvr32.exe 1916 regsvr32.exe 5044 powershell.exe 5044 powershell.exe 1916 regsvr32.exe 1916 regsvr32.exe 1916 regsvr32.exe 1960 regsvr32.EXE 1960 regsvr32.EXE 2212 powershell.exe 2212 powershell.exe 1916 regsvr32.exe 1960 regsvr32.EXE 1960 regsvr32.EXE 1916 regsvr32.exe 1916 regsvr32.exe 5028 regsvr32.EXE 5028 regsvr32.EXE 1668 powershell.exe 1668 powershell.exe 5028 regsvr32.EXE 5028 regsvr32.EXE 1916 regsvr32.exe 1916 regsvr32.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4572 powershell.exe Token: SeIncreaseQuotaPrivilege 4572 powershell.exe Token: SeSecurityPrivilege 4572 powershell.exe Token: SeTakeOwnershipPrivilege 4572 powershell.exe Token: SeLoadDriverPrivilege 4572 powershell.exe Token: SeSystemProfilePrivilege 4572 powershell.exe Token: SeSystemtimePrivilege 4572 powershell.exe Token: SeProfSingleProcessPrivilege 4572 powershell.exe Token: SeIncBasePriorityPrivilege 4572 powershell.exe Token: SeCreatePagefilePrivilege 4572 powershell.exe Token: SeBackupPrivilege 4572 powershell.exe Token: SeRestorePrivilege 4572 powershell.exe Token: SeShutdownPrivilege 4572 powershell.exe Token: SeDebugPrivilege 4572 powershell.exe Token: SeSystemEnvironmentPrivilege 4572 powershell.exe Token: SeRemoteShutdownPrivilege 4572 powershell.exe Token: SeUndockPrivilege 4572 powershell.exe Token: SeManageVolumePrivilege 4572 powershell.exe Token: 33 4572 powershell.exe Token: 34 4572 powershell.exe Token: 35 4572 powershell.exe Token: 36 4572 powershell.exe Token: SeDebugPrivilege 5056 PowerShell.exe Token: SeIncreaseQuotaPrivilege 5056 PowerShell.exe Token: SeSecurityPrivilege 5056 PowerShell.exe Token: SeTakeOwnershipPrivilege 5056 PowerShell.exe Token: SeLoadDriverPrivilege 5056 PowerShell.exe Token: SeSystemProfilePrivilege 5056 PowerShell.exe Token: SeSystemtimePrivilege 5056 PowerShell.exe Token: SeProfSingleProcessPrivilege 5056 PowerShell.exe Token: SeIncBasePriorityPrivilege 5056 PowerShell.exe Token: SeCreatePagefilePrivilege 5056 PowerShell.exe Token: SeBackupPrivilege 5056 PowerShell.exe Token: SeRestorePrivilege 5056 PowerShell.exe Token: SeShutdownPrivilege 5056 PowerShell.exe Token: SeDebugPrivilege 5056 PowerShell.exe Token: SeSystemEnvironmentPrivilege 5056 PowerShell.exe Token: SeRemoteShutdownPrivilege 5056 PowerShell.exe Token: SeUndockPrivilege 5056 PowerShell.exe Token: SeManageVolumePrivilege 5056 PowerShell.exe Token: 33 5056 PowerShell.exe Token: 34 5056 PowerShell.exe Token: 35 5056 PowerShell.exe Token: 36 5056 PowerShell.exe Token: SeIncreaseQuotaPrivilege 5056 PowerShell.exe Token: SeSecurityPrivilege 5056 PowerShell.exe Token: SeTakeOwnershipPrivilege 5056 PowerShell.exe Token: SeLoadDriverPrivilege 5056 PowerShell.exe Token: SeSystemProfilePrivilege 5056 PowerShell.exe Token: SeSystemtimePrivilege 5056 PowerShell.exe Token: SeProfSingleProcessPrivilege 5056 PowerShell.exe Token: SeIncBasePriorityPrivilege 5056 PowerShell.exe Token: SeCreatePagefilePrivilege 5056 PowerShell.exe Token: SeBackupPrivilege 5056 PowerShell.exe Token: SeRestorePrivilege 5056 PowerShell.exe Token: SeShutdownPrivilege 5056 PowerShell.exe Token: SeDebugPrivilege 5056 PowerShell.exe Token: SeSystemEnvironmentPrivilege 5056 PowerShell.exe Token: SeRemoteShutdownPrivilege 5056 PowerShell.exe Token: SeUndockPrivilege 5056 PowerShell.exe Token: SeManageVolumePrivilege 5056 PowerShell.exe Token: 33 5056 PowerShell.exe Token: 34 5056 PowerShell.exe Token: 35 5056 PowerShell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3600 Doc_16811806711348617673558987317572681097380136281.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1916 regsvr32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4692 wrote to memory of 3348 4692 Doc_16811806711348617673558987317572681097380136281.exe 85 PID 4692 wrote to memory of 3348 4692 Doc_16811806711348617673558987317572681097380136281.exe 85 PID 4692 wrote to memory of 3348 4692 Doc_16811806711348617673558987317572681097380136281.exe 85 PID 3348 wrote to memory of 2884 3348 Doc_16811806711348617673558987317572681097380136281.tmp 87 PID 3348 wrote to memory of 2884 3348 Doc_16811806711348617673558987317572681097380136281.tmp 87 PID 3348 wrote to memory of 2884 3348 Doc_16811806711348617673558987317572681097380136281.tmp 87 PID 2884 wrote to memory of 3600 2884 Doc_16811806711348617673558987317572681097380136281.exe 88 PID 2884 wrote to memory of 3600 2884 Doc_16811806711348617673558987317572681097380136281.exe 88 PID 2884 wrote to memory of 3600 2884 Doc_16811806711348617673558987317572681097380136281.exe 88 PID 3600 wrote to memory of 1356 3600 Doc_16811806711348617673558987317572681097380136281.tmp 91 PID 3600 wrote to memory of 1356 3600 Doc_16811806711348617673558987317572681097380136281.tmp 91 PID 3600 wrote to memory of 1356 3600 Doc_16811806711348617673558987317572681097380136281.tmp 91 PID 1356 wrote to memory of 1916 1356 regsvr32.exe 92 PID 1356 wrote to memory of 1916 1356 regsvr32.exe 92 PID 1916 wrote to memory of 4572 1916 regsvr32.exe 93 PID 1916 wrote to memory of 4572 1916 regsvr32.exe 93 PID 1916 wrote to memory of 5056 1916 regsvr32.exe 97 PID 1916 wrote to memory of 5056 1916 regsvr32.exe 97 PID 1916 wrote to memory of 5044 1916 regsvr32.exe 99 PID 1916 wrote to memory of 5044 1916 regsvr32.exe 99 PID 1960 wrote to memory of 2212 1960 regsvr32.EXE 119 PID 1960 wrote to memory of 2212 1960 regsvr32.EXE 119 PID 5028 wrote to memory of 1668 5028 regsvr32.EXE 123 PID 5028 wrote to memory of 1668 5028 regsvr32.EXE 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\is-36GMM.tmp\Doc_16811806711348617673558987317572681097380136281.tmp"C:\Users\Admin\AppData\Local\Temp\is-36GMM.tmp\Doc_16811806711348617673558987317572681097380136281.tmp" /SL5="$110040,695232,190976,C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe"C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe" /VERYSILENT3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\is-MSV3E.tmp\Doc_16811806711348617673558987317572681097380136281.tmp"C:\Users\Admin\AppData\Local\Temp\is-MSV3E.tmp\Doc_16811806711348617673558987317572681097380136281.tmp" /SL5="$80036,695232,190976,C:\Users\Admin\AppData\Local\Temp\Doc_16811806711348617673558987317572681097380136281.exe" /VERYSILENT4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\8dxgi.ocx"5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\system32\regsvr32.exe/s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\8dxgi.ocx"6⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell.exe"PowerShell.exe" -NoProfile -NonInteractive -Command -7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
-
-
-
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\8dxgi.ocx"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\8dxgi.ocx"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/s /i:INSTALL \"%APPDATA%\8dxgi.ocx\"' }) { exit 0 } else { exit 1 }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5661739d384d9dfd807a089721202900b
SHA15b2c5d6a7122b4ce849dc98e79a7713038feac55
SHA25670c3ecbaa6df88e88df4efc70968502955e890a2248269641c4e2d4668ef61bf
SHA51281b48ae5c4064c4d9597303d913e32d3954954ba1c8123731d503d1653a0d848856812d2ee6951efe06b1db2b91a50e5d54098f60c26f36bc8390203f4c8a2d8
-
Filesize
1KB
MD5d8c4c3d14adbee73e58ff1adeac48ac3
SHA10bb4147a829187ea9ab78befab4853adb9f4912a
SHA256e76d716b472ec22bcc21a677560d4b77d27b9a1c6561444e4d446dc0bcc927d7
SHA51234b28d487e41a6537d00b0749459a8b599a6e153d6dd7f8d60d829e7234ba05c15e58693b3db5900cbf8bb6cefa8356e4f8d04e2ea4e1f59bffa318c64ebedef
-
Filesize
1KB
MD512c844ed8342738dacc6eb0072c43257
SHA1b7f2f9e3ec4aaf5e2996720f129cd64887ac91d7
SHA2562afeb7db4e46d3c1524512a73448e9cd0121deec761d8aa54fa9fe8b56df7519
SHA512e3de9103533a69cccc36cd377297ba3ec9bd7a1159e1349d2cc01ab66a88a5a82b4ee3af61fab586a0cdfab915c7408735439fd0462c5c2cc2c787cb0765766a
-
Filesize
1KB
MD52ac3c9ba89b8c2ef19c601ecebb82157
SHA1a239a4b11438c00e5ff89ebd4a804ede6a01935b
SHA2563c2714ce07f8c04b3f8222dfe50d8ae08f548b0e6e79fe33d08bf6f4c2e5143e
SHA512b1221d29e747b37071761b2509e9109b522cce6411f73f27c9428ac332d26b9f413ae6b8c0aeac1afb7fab2d0b3b1c4af189da12fe506287596df2ef8f083432
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Local\Temp\is-36GMM.tmp\Doc_16811806711348617673558987317572681097380136281.tmp
Filesize1.2MB
MD55824259f69c4ece6cc28a81c9dec3abe
SHA16c4d89700e5c396407ec074331a6028e90a21ba4
SHA25625d874689683f19a474590bc869bb9abcdc7472393fc57344f1a24bda05a4fc0
SHA5120f19b9aeda82acab6d2c48612b30ff3f1d533d033dfac011c5c81c113f0139a8cc99a756b2105df334fdcd02cf38b16ef79ccc002ae1eff096fa4119d0273477
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
1.2MB
MD58489f0b3c714542bd3aba532a16728ba
SHA13e51def0437bf4465a1852ec2148e401fc999fd3
SHA256d1ddcd8b4c506f3af24f6ee63209de1342b1a5b29a73d8baadfea8d087daf940
SHA512721cd16e7f7a9bb0a020f3f2849aa1f3e7de4abf1db1f7da307fab9a6b74d8d9db52353a7c5b988fe300bc589f218d81513ad726d7f6cba078b55cb009d60a7c