Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    297s
  • max time network
    301s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    10/12/2023, 22:20

General

  • Target

    2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d.exe

  • Size

    4.7MB

  • MD5

    37f406c2985041ad85f1f3d6db1249ff

  • SHA1

    56f4ed0bcba0bf7fe60c27d1ddf260f32b9e29c3

  • SHA256

    2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d

  • SHA512

    f3415cb83d10ef62aca5986dd668b1109162651eaf509a06ee42bc1f3fb63c2ff5d8ab7ceeac9c098f3b5f121c8d278a0d97f3341e13f0f55bf564aaed1f5b6b

  • SSDEEP

    98304:xrfhS3srwSUx+DMn+8vYDhRgUqmF14UZr:xrfhS3EDg+lZt9Z

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • Detects Arechclient2 RAT 5 IoCs

    Arechclient2.

  • SectopRAT

    SectopRAT is a remote access trojan first seen in November 2019.

  • SectopRAT payload 5 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • .NET Reactor proctector 1 IoCs

    Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d.exe
    "C:\Users\Admin\AppData\Local\Temp\2afe84f8866168611d41b5eec0345f3e3459f611a77859f71f9be7e0f635736d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      2⤵
        PID:2944
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        2⤵
          PID:2820
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
          2⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2792

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp83E1.tmp

        Filesize

        20KB

        MD5

        c9ff7748d8fcef4cf84a5501e996a641

        SHA1

        02867e5010f62f97ebb0cfb32cb3ede9449fe0c9

        SHA256

        4d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988

        SHA512

        d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73

      • \Users\Admin\AppData\Local\Temp\Protect544cd51a.dll

        Filesize

        742KB

        MD5

        544cd51a596619b78e9b54b70088307d

        SHA1

        4769ddd2dbc1dc44b758964ed0bd231b85880b65

        SHA256

        dfce2d4d06de6452998b3c5b2dc33eaa6db2bd37810d04e3d02dc931887cfddd

        SHA512

        f56d8b81022bb132d40aa78596da39b5c212d13b84b5c7d2c576bbf403924f1d22e750de3b09d1be30aea359f1b72c5043b19685fc9bf06d8040bfee16b17719

      • memory/2360-45-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-1-0x00000000000E0000-0x00000000005A0000-memory.dmp

        Filesize

        4.8MB

      • memory/2360-4-0x00000000069E0000-0x0000000006B72000-memory.dmp

        Filesize

        1.6MB

      • memory/2360-2-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-10-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-9-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-11-0x0000000000760000-0x0000000000770000-memory.dmp

        Filesize

        64KB

      • memory/2360-12-0x0000000074450000-0x0000000074B3E000-memory.dmp

        Filesize

        6.9MB

      • memory/2360-14-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-16-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-15-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-13-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-17-0x0000000006F60000-0x0000000007060000-memory.dmp

        Filesize

        1024KB

      • memory/2360-18-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-19-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-54-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-3-0x0000000006740000-0x00000000069DC000-memory.dmp

        Filesize

        2.6MB

      • memory/2360-53-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-52-0x0000000006F60000-0x0000000007060000-memory.dmp

        Filesize

        1024KB

      • memory/2360-51-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-48-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-49-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-50-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-35-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-0-0x0000000074450000-0x0000000074B3E000-memory.dmp

        Filesize

        6.9MB

      • memory/2360-47-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2360-46-0x00000000052F0000-0x0000000005330000-memory.dmp

        Filesize

        256KB

      • memory/2792-22-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2792-34-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2792-30-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2792-32-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2792-28-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

        Filesize

        4KB

      • memory/2792-26-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2792-24-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB

      • memory/2792-20-0x0000000000400000-0x00000000004D2000-memory.dmp

        Filesize

        840KB