Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/03/2025, 21:58
250312-1vyfqat1dx 1012/03/2025, 21:51
250312-1qnqqawkv6 1012/03/2025, 21:45
250312-1mkjwstzcv 10Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2025, 21:58
Static task
static1
Behavioral task
behavioral1
Sample
Report.ps1
Resource
win7-20240903-en
General
-
Target
Report.ps1
-
Size
458KB
-
MD5
20d2c488f9ce3e337faf20ea1a9abe47
-
SHA1
ea844520e903e1f7d8f234a057cd3cc778380ae9
-
SHA256
6e7ff182d4509ea804b6ed739ffa2191af2891af164ede9a90e79aea8fee4d1f
-
SHA512
6581df037579fd6684ee4a44d2e631a4aa9c524b47c47fe2afb9434c487824146fb000d9c7a7b63df6c534b00f4a979f24be88019b3ed12d9bf3ce81508b243c
-
SSDEEP
768:llcMsNARzF0NToMotYJKN2C0FIMG9Kl/2:6/2
Malware Config
Extracted
asyncrat
A 14
Default
nams.ddnsfree.com:409
aliomar.ooguy.com:409
MaterxMutex_Egypt409
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Asyncrat family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3444 set thread context of 3832 3444 powershell.exe 93 -
pid Process 3444 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_compiler.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 taskmgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString taskmgr.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3181990009-820930284-137514597-1000_Classes\Local Settings taskmgr.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3832 aspnet_compiler.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3444 powershell.exe 3444 powershell.exe 3444 powershell.exe 3444 powershell.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe 3832 aspnet_compiler.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4660 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3444 powershell.exe Token: SeDebugPrivilege 3832 aspnet_compiler.exe Token: SeDebugPrivilege 4660 taskmgr.exe Token: SeSystemProfilePrivilege 4660 taskmgr.exe Token: SeCreateGlobalPrivilege 4660 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe 4660 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3832 aspnet_compiler.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3444 wrote to memory of 1816 3444 powershell.exe 92 PID 3444 wrote to memory of 1816 3444 powershell.exe 92 PID 3444 wrote to memory of 1816 3444 powershell.exe 92 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 3832 3444 powershell.exe 93 PID 3444 wrote to memory of 740 3444 powershell.exe 94 PID 3444 wrote to memory of 740 3444 powershell.exe 94 PID 4460 wrote to memory of 4500 4460 msedge.exe 125 PID 4460 wrote to memory of 4500 4460 msedge.exe 125 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 3848 4460 msedge.exe 126 PID 4460 wrote to memory of 4264 4460 msedge.exe 127 PID 4460 wrote to memory of 4264 4460 msedge.exe 127 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 PID 4460 wrote to memory of 1124 4460 msedge.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Report.ps11⤵
- Suspicious use of SetThreadContext
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵PID:1816
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3832
-
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /query /tn administrator2⤵PID:740
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4000
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /71⤵
- Checks SCSI registry key(s)
- Checks processor information in registry
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4660
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefaultb91bf8a5h8acdh436bh9ae1hf082754fbbde1⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0x40,0x12c,0x7ffa6ed946f8,0x7ffa6ed94708,0x7ffa6ed947182⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4264555766554708740,1732725223942431800,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4264555766554708740,1732725223942431800,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4264555766554708740,1732725223942431800,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:1124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54255cae88563058c7eaed69088da0ab2
SHA12bcb70f6ae6ae0207a7a964422cac20c80b26394
SHA256b0cb92f0d6e6cb20ace15d6bf06015570aee24c0d06a8102200dfd3cf4118a15
SHA512cb41c1797e6d6c5a70d9045e0319ac92512deeb4d4280a1d9a607c2a4031db6027a050633b95fadce63f6f7513ba599f336182b6ce50a0cfbc44360723c461eb
-
Filesize
5KB
MD5f27a40acdbc512c7a46a5eabded4f3f4
SHA1f533c74e61eaa65ae24158b06406c2a1df95a270
SHA256f981aba12e7ea6abdcbd4910328c52845ae5b3b174d1669dafce7b785f5cac9c
SHA51204c24823290f67f1b30da8b72c75b1b86a9ccdbd94d294ba7b73110b1d3725ec5cb60245487c7a15ba3290f29d447401e42957309242a097d3ad6876071219b7
-
Filesize
3KB
MD5731856fae5e76fa9dd617120afe5e232
SHA1997bafe44c791cf56c6f5aaab7eab8995bb84d4e
SHA256abdbe95d2175eb33aaea382ff2f2e6b6248f9cb2c07b8dbe9f3b42ca48c2f9c7
SHA512e3a00080ab0b29e82e5e3d2892b82087459dfb87520efd026d28b82e3cd8845e8a74ec9df9600e35268b068119ae57657689904f15f1b0b3b42b5577045af795
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
7.2MB
MD5f6d8913637f1d5d2dc846de70ce02dc5
SHA15fc9c6ab334db1f875fbc59a03f5506c478c6c3e
SHA2564e72ca1baee2c7c0f50a42614d101159a9c653a8d6f7498f7bf9d7026c24c187
SHA51221217a0a0eca58fc6058101aa69cf30d5dbe419c21fa7a160f44d8ebbcf5f4011203542c8f400a9bb8ee3826706417f2939c402f605817df597b7ff812b43036