Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
04/11/2023, 21:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231023-en
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
812KB
-
MD5
140510ca012bf95c60b339b6388c2ca9
-
SHA1
97f4ef1024bd3c194572e8d3189f8fbf9d5cb127
-
SHA256
f00b2b25861c0218820c23eca788881bc73c8470f59872989acf60c04cd83630
-
SHA512
ee30c446d26f740d9b557f99cff04b3d471793b840b56ef769eee3011d6d2fda728a4864973ba4310e4a0d5793976b9f896c73b2d2317cdc7eec23810f4a0cf0
-
SSDEEP
12288:X8+/Pqc6JGU0QC6MFqRG1DOkzfAWSiXBZP6haDD5F33XUTmzFJNDVSAQ:s+/PqcFU7vMgqEOrP6haDlFHET0DMA
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3312-7-0x0000000007980000-0x0000000007A3C000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-9-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-8-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-11-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-13-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-15-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-17-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-19-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-21-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-25-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-23-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-27-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-29-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-31-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-33-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-35-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-37-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-39-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-41-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-43-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-45-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-47-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-49-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-51-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-53-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-55-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-57-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-59-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-61-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-63-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-65-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-67-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-69-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 behavioral2/memory/3312-71-0x0000000007980000-0x0000000007A36000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3312 set thread context of 1948 3312 tmp.exe 98 -
Program crash 1 IoCs
pid pid_target Process procid_target 3944 1948 WerFault.exe 98 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3312 tmp.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98 PID 3312 wrote to memory of 1948 3312 tmp.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:1948
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 5723⤵
- Program crash
PID:3944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1948 -ip 19481⤵PID:4516