Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
06/11/2023, 01:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
140510ca012bf95c60b339b6388c2ca9.exe
Resource
win7-20231023-en
6 signatures
150 seconds
General
-
Target
140510ca012bf95c60b339b6388c2ca9.exe
-
Size
812KB
-
MD5
140510ca012bf95c60b339b6388c2ca9
-
SHA1
97f4ef1024bd3c194572e8d3189f8fbf9d5cb127
-
SHA256
f00b2b25861c0218820c23eca788881bc73c8470f59872989acf60c04cd83630
-
SHA512
ee30c446d26f740d9b557f99cff04b3d471793b840b56ef769eee3011d6d2fda728a4864973ba4310e4a0d5793976b9f896c73b2d2317cdc7eec23810f4a0cf0
-
SSDEEP
12288:X8+/Pqc6JGU0QC6MFqRG1DOkzfAWSiXBZP6haDD5F33XUTmzFJNDVSAQ:s+/PqcFU7vMgqEOrP6haDlFHET0DMA
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1832-6-0x0000000006180000-0x000000000623C000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-7-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-10-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-14-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-16-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-18-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-12-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-20-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-22-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-24-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-26-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-28-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-30-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-32-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-8-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-34-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-36-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-38-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-40-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-42-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-46-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-48-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-50-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-52-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-54-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-56-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-58-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-60-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-64-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-66-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-70-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-68-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-62-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 behavioral2/memory/1832-44-0x0000000006180000-0x0000000006236000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1832 set thread context of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 -
Program crash 1 IoCs
pid pid_target Process procid_target 2384 896 WerFault.exe 92 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1832 140510ca012bf95c60b339b6388c2ca9.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92 PID 1832 wrote to memory of 896 1832 140510ca012bf95c60b339b6388c2ca9.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\140510ca012bf95c60b339b6388c2ca9.exe"C:\Users\Admin\AppData\Local\Temp\140510ca012bf95c60b339b6388c2ca9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 896 -s 5723⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 896 -ip 8961⤵PID:1820