Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3099355d506...eb.exe
windows7-x64
10099355d506...eb.exe
windows10-2004-x64
1023d6f9a120...1e.exe
windows7-x64
823d6f9a120...1e.exe
windows10-2004-x64
83a9efda763...8a.exe
windows7-x64
103a9efda763...8a.exe
windows10-2004-x64
103b49b6c1cc...86.exe
windows7-x64
103b49b6c1cc...86.exe
windows10-2004-x64
104f8799e544...b7.exe
windows7-x64
104f8799e544...b7.exe
windows10-2004-x64
1051bd8c50dd...09.exe
windows7-x64
1051bd8c50dd...09.exe
windows10-2004-x64
1056b7b7798a...0e.exe
windows7-x64
1056b7b7798a...0e.exe
windows10-2004-x64
1057fb495954...9d.exe
windows7-x64
1057fb495954...9d.exe
windows10-2004-x64
105f278f8bde...cb.exe
windows7-x64
105f278f8bde...cb.exe
windows10-2004-x64
1066b157a3d4...e6.exe
windows7-x64
1066b157a3d4...e6.exe
windows10-2004-x64
106ec9f82a79...36.exe
windows7-x64
106ec9f82a79...36.exe
windows10-2004-x64
108d469fed80...33.exe
windows7-x64
108d469fed80...33.exe
windows10-2004-x64
10977e5ce44a...f1.exe
windows7-x64
10977e5ce44a...f1.exe
windows10-2004-x64
10a4865b2ed7...c6.exe
windows7-x64
10a4865b2ed7...c6.exe
windows10-2004-x64
10cbee3a2ab9...7f.exe
windows7-x64
10cbee3a2ab9...7f.exe
windows10-2004-x64
10cd3b81fbf9...1c.exe
windows7-x64
10cd3b81fbf9...1c.exe
windows10-2004-x64
10Resubmissions
12/03/2025, 21:32
250312-1dmynatxey 1011/03/2025, 16:10
250311-tmgdxaxnx4 1006/03/2025, 02:30
250306-cze8yav1az 10Analysis
-
max time kernel
900s -
max time network
901s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2025, 16:10
Static task
static1
Behavioral task
behavioral1
Sample
099355d506f15966ba946cd6f58a72f6c02c73232349cf7f2d6af5641eed0ceb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
099355d506f15966ba946cd6f58a72f6c02c73232349cf7f2d6af5641eed0ceb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
23d6f9a120790d441377488f28c15f7ffc4df84c3fb5d05ce42f0bae5d75731e.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
23d6f9a120790d441377488f28c15f7ffc4df84c3fb5d05ce42f0bae5d75731e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral5
Sample
3a9efda763f017e1ca8237aa27f8659b081f62f42e11aa36b6e122f65caca48a.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
3a9efda763f017e1ca8237aa27f8659b081f62f42e11aa36b6e122f65caca48a.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral7
Sample
3b49b6c1cc92bed7fb10ec3399c1f03449c5ab983a7d03f22bd83392b7a2dc86.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
3b49b6c1cc92bed7fb10ec3399c1f03449c5ab983a7d03f22bd83392b7a2dc86.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral9
Sample
4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral11
Sample
51bd8c50dd5a58aa312bbcd0db0a1c297b929b8addb04cca5552a0ed1a79b209.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
51bd8c50dd5a58aa312bbcd0db0a1c297b929b8addb04cca5552a0ed1a79b209.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral13
Sample
56b7b7798a01e1bad522a375b7b096efeba0e118885b353b525b44471cdec90e.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
56b7b7798a01e1bad522a375b7b096efeba0e118885b353b525b44471cdec90e.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral15
Sample
57fb4959548b3597ea3689167e496cdbb83d07afa9f0f3acb6a56987cd50099d.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
57fb4959548b3597ea3689167e496cdbb83d07afa9f0f3acb6a56987cd50099d.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral17
Sample
5f278f8bdee6e51c769320f10506c28a4e84a56ee3ff44f63eec9a189236b1cb.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
5f278f8bdee6e51c769320f10506c28a4e84a56ee3ff44f63eec9a189236b1cb.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral19
Sample
66b157a3d414b913b1a436edc71e8fc733c1f5457302fe9ca950a8b16d86b9e6.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
66b157a3d414b913b1a436edc71e8fc733c1f5457302fe9ca950a8b16d86b9e6.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral21
Sample
6ec9f82a79152492b6a50a55dee43665e5205d607206573ce3729f824a05db36.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
6ec9f82a79152492b6a50a55dee43665e5205d607206573ce3729f824a05db36.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral23
Sample
8d469fed80fcd597d17e15df98cd15a4646abb69cd7f81795af94c2c46ed2a33.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
8d469fed80fcd597d17e15df98cd15a4646abb69cd7f81795af94c2c46ed2a33.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral25
Sample
977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral27
Sample
a4865b2ed7dce154e50357674e8f15052a532609af0026dc4c8ea69b8a2f77c6.exe
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
a4865b2ed7dce154e50357674e8f15052a532609af0026dc4c8ea69b8a2f77c6.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral29
Sample
cbee3a2ab943816de40704ed266962b9d84d1a9b58a4a79f0200eb2a7258197f.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
cbee3a2ab943816de40704ed266962b9d84d1a9b58a4a79f0200eb2a7258197f.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral31
Sample
cd3b81fbf93281530341f8c8cd66cfdeb7b2f1ec04f6fbe68ddcc35d28200a1c.exe
Resource
win7-20240903-en
General
-
Target
977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe
-
Size
376KB
-
MD5
5022069109525eccc6b1f9aea5310c30
-
SHA1
07427c696897bbe46a384aed624c4fd0b55d155c
-
SHA256
977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1
-
SHA512
d2c6b6175bf776d61efdeaf522ff5b73da883d84dfa10804d4bab2e0c8e83b82af839a0328e4ef1493dddf323edc2c496df55f13e99912b27a6b61d4cd363600
-
SSDEEP
6144:nqEVr2/qK1pyQh6taaDBZ5/jsJVNA/yrg2Nz7Dw6qXaWB7dybpFr1:qEVr2/q08Qh2akBZdjsJVNA/92NjuaWE
Malware Config
Extracted
revengerat
NyanCatRevenge
hpdndbnb.duckdns.org:2404
90a49aa7c27647e
Extracted
asyncrat
0.5.7B
Default
gpmaw.duckdns.org:3040
gpmaw.duckdns.org:2020
gpmaw.duckdns.org:4040
hpdndbnb.duckdns.org:3040
hpdndbnb.duckdns.org:2020
hpdndbnb.duckdns.org:4040
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
Acrobat Reader .exe
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
RevengeRAT
Remote-access trojan with a wide range of capabilities.
-
Revengerat family
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation ASapAC.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation AsyncClient no setting.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Adobe Reader.exe -
Executes dropped EXE 10 IoCs
pid Process 2192 ASapAC.exe 2704 ASapAC.exe 212 AsyncClient no setting.exe 4428 AsyncClient no setting.exe 1444 ASapAC.exe 3768 ASapAC.exe 4604 ASapAC.exe 2448 ASapAC.exe 3952 Adobe Reader.exe 3444 Adobe Reader.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3364 set thread context of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 2192 set thread context of 2704 2192 ASapAC.exe 104 PID 212 set thread context of 4428 212 AsyncClient no setting.exe 111 PID 1444 set thread context of 3768 1444 ASapAC.exe 113 PID 4604 set thread context of 2448 4604 ASapAC.exe 123 PID 3952 set thread context of 3444 3952 Adobe Reader.exe 127 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1020 1444 WerFault.exe 112 4296 4604 WerFault.exe 117 -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobe Reader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASapAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASapAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASapAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient no setting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AsyncClient no setting.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASapAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASapAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ASapAC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5028 schtasks.exe 4148 schtasks.exe 4960 schtasks.exe 1236 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe Token: SeDebugPrivilege 2192 ASapAC.exe Token: SeDebugPrivilege 212 AsyncClient no setting.exe Token: SeDebugPrivilege 1444 ASapAC.exe Token: SeDebugPrivilege 4604 ASapAC.exe Token: SeDebugPrivilege 3952 Adobe Reader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3612 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 89 PID 3364 wrote to memory of 3488 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 98 PID 3364 wrote to memory of 3488 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 98 PID 3364 wrote to memory of 3488 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 98 PID 3364 wrote to memory of 3992 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 100 PID 3364 wrote to memory of 3992 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 100 PID 3364 wrote to memory of 3992 3364 977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe 100 PID 3488 wrote to memory of 5028 3488 cmd.exe 102 PID 3488 wrote to memory of 5028 3488 cmd.exe 102 PID 3488 wrote to memory of 5028 3488 cmd.exe 102 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 2704 2192 ASapAC.exe 104 PID 2192 wrote to memory of 212 2192 ASapAC.exe 105 PID 2192 wrote to memory of 212 2192 ASapAC.exe 105 PID 2192 wrote to memory of 212 2192 ASapAC.exe 105 PID 2192 wrote to memory of 1224 2192 ASapAC.exe 106 PID 2192 wrote to memory of 1224 2192 ASapAC.exe 106 PID 2192 wrote to memory of 1224 2192 ASapAC.exe 106 PID 2192 wrote to memory of 5064 2192 ASapAC.exe 107 PID 2192 wrote to memory of 5064 2192 ASapAC.exe 107 PID 2192 wrote to memory of 5064 2192 ASapAC.exe 107 PID 1224 wrote to memory of 4148 1224 cmd.exe 110 PID 1224 wrote to memory of 4148 1224 cmd.exe 110 PID 1224 wrote to memory of 4148 1224 cmd.exe 110 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 212 wrote to memory of 4428 212 AsyncClient no setting.exe 111 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 1444 wrote to memory of 3768 1444 ASapAC.exe 113 PID 212 wrote to memory of 4748 212 AsyncClient no setting.exe 118 PID 212 wrote to memory of 4748 212 AsyncClient no setting.exe 118 PID 212 wrote to memory of 4748 212 AsyncClient no setting.exe 118 PID 212 wrote to memory of 2004 212 AsyncClient no setting.exe 119 PID 212 wrote to memory of 2004 212 AsyncClient no setting.exe 119 PID 212 wrote to memory of 2004 212 AsyncClient no setting.exe 119 PID 4748 wrote to memory of 4960 4748 cmd.exe 122 PID 4748 wrote to memory of 4960 4748 cmd.exe 122 PID 4748 wrote to memory of 4960 4748 cmd.exe 122 PID 4604 wrote to memory of 2448 4604 ASapAC.exe 123 PID 4604 wrote to memory of 2448 4604 ASapAC.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe"C:\Users\Admin\AppData\Local\Temp\977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe"C:\Users\Admin\AppData\Local\Temp\977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3612
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1.exe" "C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"2⤵
- System Location Discovery: System Language Discovery
PID:3992
-
-
C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exeC:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\ASapAC\AsyncClient no setting.exe"C:\Users\Admin\AppData\Local\Temp\ASapAC\AsyncClient no setting.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\ASapAC\AsyncClient no setting.exe"C:\Users\Admin\AppData\Local\Temp\ASapAC\AsyncClient no setting.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe'" /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ASapAC\AsyncClient no setting.exe" "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe'" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4148
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe" "C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"2⤵
- System Location Discovery: System Language Discovery
PID:5064
-
-
C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exeC:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3768
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1444 -s 8162⤵
- Program crash
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1444 -ip 14441⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exeC:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"C:\Users\Admin\AppData\Local\Temp\ASapAC\ASapAC.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 8162⤵
- Program crash
PID:4296
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 176 -p 4604 -ip 46041⤵PID:264
-
C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe"1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe"C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3444
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe'" /f2⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe'" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1236
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe" "C:\Users\Admin\AppData\Roaming\Adobe Reader\Adobe Reader.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2200
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
321B
MD508027eeee0542c93662aef98d70095e4
SHA142402c02bf4763fcd6fb0650fc13386f2eae8f9b
SHA2561b9ec007ac8e7de37c61313c5e1b9444df6dc0cd9110553bfa281b13204a646d
SHA512c4e7a17a1dc1f27c91791439d92435a5d750a065508e9539c9af458f21472a7ce45ba0666ef6855a00386e1a75c518d0908b82d929084a1b67ca4c65997a5979
-
Filesize
376KB
MD55022069109525eccc6b1f9aea5310c30
SHA107427c696897bbe46a384aed624c4fd0b55d155c
SHA256977e5ce44a0ca0b374857f1f9ba476376ab41b7edf1117a3f5b805a69244f6f1
SHA512d2c6b6175bf776d61efdeaf522ff5b73da883d84dfa10804d4bab2e0c8e83b82af839a0328e4ef1493dddf323edc2c496df55f13e99912b27a6b61d4cd363600
-
Filesize
280KB
MD5211fe2f27eb6bb501821766ffe46f8c6
SHA1cdb9c540719567b7ef64677f1fe030de377cb534
SHA2566497a1878d2676ba6e4184692baceb2147f09a0cf6ce117ff09c8d759a64d3df
SHA512fcf4c0284577d770f29520910c6e3d6121a35a9d68748708e8e9556d5ec811813525df7820e7b632122289de4e095f8a989a999f662526bf00c853f3057c9089