Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
21/07/2023, 08:38
Static task
static1
Behavioral task
behavioral1
Sample
ZOOKAgentSetup.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
ZOOKAgentSetup.exe
Resource
win10v2004-20230703-en
General
-
Target
ZOOKAgentSetup.exe
-
Size
5.9MB
-
MD5
c20aabde16ac81d65fbea5a169ed7a2d
-
SHA1
a48b94093249502621a0bccda2d4eabfde45da8a
-
SHA256
84fe0ea4048f95903ebe8692d1ce80c8db35205a8409eb0471f0dd78cb5fe471
-
SHA512
e27266a0a763975ed2d767abeb94f0c47da0c71f2a58d5eaf159180c38a7f1d8d4e5a20eaa79e618c344a00cd6f3a83ab549965fa991bd50361081d6fa25aa2e
-
SSDEEP
98304:fo1TPwHdnlRlaWc/KiU3oNzu8WoFcmRA3gTNVl1WxTMzz3uZr7pGvy9bpXPwxbBR:QC9UzU3cWobGgTV1ah7R9bpEyZ/E
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 920 ZOOKAgentSetup.tmp -
Loads dropped DLL 3 IoCs
pid Process 2224 ZOOKAgentSetup.exe 920 ZOOKAgentSetup.tmp 920 ZOOKAgentSetup.tmp -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 920 ZOOKAgentSetup.tmp -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28 PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28 PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28 PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28 PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28 PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28 PID 2224 wrote to memory of 920 2224 ZOOKAgentSetup.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZOOKAgentSetup.exe"C:\Users\Admin\AppData\Local\Temp\ZOOKAgentSetup.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\is-QKI52.tmp\ZOOKAgentSetup.tmp"C:\Users\Admin\AppData\Local\Temp\is-QKI52.tmp\ZOOKAgentSetup.tmp" /SL5="$80122,5922338,56832,C:\Users\Admin\AppData\Local\Temp\ZOOKAgentSetup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:920
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
695KB
MD5e0ae0a667d7b126207dd6b4ed73b2143
SHA19ff30b267c392cd37ff4aa14a7fb6ca19429ec80
SHA2564aa3ecc9847b49618a9b72fc528400df93a10fb33b607960397176f5aefd0e0d
SHA512e4a24464a1c8b046b857031c0518babe62bf6e9d26a79e75d6303d1c9e742fe31e036e62f0558ad3d489c15c7f790befc8529cd6884cf44ce2b16b624454973f
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
695KB
MD5e0ae0a667d7b126207dd6b4ed73b2143
SHA19ff30b267c392cd37ff4aa14a7fb6ca19429ec80
SHA2564aa3ecc9847b49618a9b72fc528400df93a10fb33b607960397176f5aefd0e0d
SHA512e4a24464a1c8b046b857031c0518babe62bf6e9d26a79e75d6303d1c9e742fe31e036e62f0558ad3d489c15c7f790befc8529cd6884cf44ce2b16b624454973f