Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 11:42
Static task
static1
Behavioral task
behavioral1
Sample
6bb1fc39a710a20d4bd7779731e0a972.exe
Resource
win7-20231215-en
General
-
Target
6bb1fc39a710a20d4bd7779731e0a972.exe
-
Size
12.7MB
-
MD5
6bb1fc39a710a20d4bd7779731e0a972
-
SHA1
12b64c61fe8208acef248ec8e29fdad3bbf90758
-
SHA256
ed1d9fc091189331d57eba3193aa865680c155c2f1d846ca8a408c70edda8e8d
-
SHA512
6b4b2dd220cd376d9117dd88cb4ceb406148c1cbb42dfa3955d68e33c38e29021f03ff64887b3b4877fe8158a5a63140ba8f9247274f607ccaa54b79225c9b96
-
SSDEEP
49152:lD6jEjcV5chDISveiY6gDosgTsraT8q7u7jhQFjlRYHK8t54cZ1kZccahMPonhzM:pTOeuLFGiJ3P0
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2380-55-0x000000001B530000-0x000000001B87C000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-56-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-59-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-65-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-67-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-71-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-77-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-83-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-85-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-89-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-95-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-99-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-105-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-111-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-115-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-119-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-117-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-113-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-109-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-107-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-103-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-101-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-97-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-93-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-91-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-87-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-81-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-79-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-75-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-73-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-69-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-63-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-61-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 behavioral1/memory/2380-57-0x000000001B530000-0x000000001B875000-memory.dmp family_zgrat_v1 -
NirSoft WebBrowserPassView 1 IoCs
Password recovery tool for various web browsers
resource yara_rule behavioral1/memory/2504-2310-0x000000001B420000-0x000000001B762000-memory.dmp WebBrowserPassView -
Nirsoft 2 IoCs
resource yara_rule behavioral1/memory/2504-2310-0x000000001B420000-0x000000001B762000-memory.dmp Nirsoft behavioral1/files/0x0006000000015d5f-2417.dat Nirsoft -
resource yara_rule behavioral1/files/0x0006000000015d68-2408.dat upx behavioral1/files/0x0006000000015d57-2406.dat upx -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 api64.ipify.org 5 api64.ipify.org -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 2668 PING.EXE 2596 PING.EXE 1828 PING.EXE 2832 PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bb1fc39a710a20d4bd7779731e0a972.exe"C:\Users\Admin\AppData\Local\Temp\6bb1fc39a710a20d4bd7779731e0a972.exe"1⤵PID:2380
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:2980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:2988
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:1928
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
PID:1828
-
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Llklnklaprkhrsl.vbs"2⤵PID:2116
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Service.exe'3⤵PID:1620
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\6bb1fc39a710a20d4bd7779731e0a972.exe" -Force2⤵PID:1792
-
-
C:\Users\Admin\AppData\Local\Temp\InstallUtil.exeC:\Users\Admin\AppData\Local\Temp\InstallUtil.exe2⤵PID:2808
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Llklnklaprkhrsl.vbs"2⤵PID:1760
-
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com1⤵
- Runs ping.exe
PID:2832
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com1⤵
- Runs ping.exe
PID:2668
-
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com1⤵
- Runs ping.exe
PID:2596
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /K & exit1⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe" ZhXl39BlhP84+Y4kurA8wpehxxqA0X22IMYZ6Vpiqs6gQIB1aBuML/fMO8V+2SXQV2mwc0TaphiLYZaGWfUOi1WgGrrwfZsljwvBFt3P08D1H1gG93wNGvKMabHAjxu5IhiDr06lM3ChIuVZWIt+7Hm/EI9RPxL7nfe1gorT7Mc=1⤵PID:2504
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"2⤵PID:680
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"2⤵PID:1536
-
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\compile.vbs"2⤵PID:1812
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\RtkBtManServ.exe"2⤵PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\Mxgobydrqfcbuilder.exe"C:\Users\Admin\AppData\Local\Temp\Mxgobydrqfcbuilder.exe"1⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\snuvcdsm.exeC:\Users\Admin\AppData\Local\Temp\snuvcdsm.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_Passwords.txt"1⤵PID:632
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat1⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\hh.exeC:\Users\Admin\AppData\Local\Temp\hh.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies3"1⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\splwow64.exeC:\Users\Admin\AppData\Local\Temp\splwow64.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies2"1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\winhlp32.exeC:\Users\Admin\AppData\Local\Temp\winhlp32.exe /stext "C:\Users\Admin\AppData\Local\Temp\Cookies1"1⤵PID:964
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat1⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\xwizard.exeC:\Users\Admin\AppData\Local\Temp\xwizard.exe /stext "C:\Users\Admin\AppData\Local\Temp\Admin_History.txt"1⤵PID:2512
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c compile.bat1⤵PID:2828
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
1.3MB
MD532442f4c82b3c1c2c9317059ebb75250
SHA13413b4b7b5353a59cd33b31762ef08719767624f
SHA256275d93020e65f877e37c86244ca2233df84cbb6d4a60387438183bd7dedb9b51
SHA512e5e0eddb18c0831537ac60ff96e7d80bbc3c89b13d61a27732a6f1d3491e502f00ed6d2cdda6bb5a1bb8805c25afe704c8ccdbd4674d693ed15c37dc5df37679
-
Filesize
854KB
MD5629f96c6a8d0913e660fee27e09337c8
SHA1472e9db5840de6b6a9d9a01d190497ee0f936475
SHA256908b9a46e0aeb3136456e48989e52a81a1604d9b15d3f0ef6f23d0fb1249220e
SHA512f3ddd7a7e4ffa03d40b8ee2d5767b9e86e14372fcc153a6f799093ebe747e18b5c024e3683e46fec37b8b6182bd3ed410df9efc6176b9856b121ddf6e550a378
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
156B
MD5eb51755b637423154d1341c6ee505f50
SHA1d71d27e283b26e75e58c0d02f91d91a2e914c959
SHA256db903aae119dc795581080a528ba04286be11be7e9d417305d77123545fbf0f9
SHA512e23463fe0a3719c2700826b55f375f60e5e67f3e432aa8e90c5afc8f449fc635aa4c031f9b6fa71344a8da9542585b74e4c812383043868a10a1065d477acee5
-
Filesize
108B
MD51ba367d0f9aac0f650e65ab7401776c0
SHA175cf3295125cfaa0c247ebccc57e63f915198683
SHA25668c4ec552c98f3b5a4744e4eefadd6364dc8075c2e718b7bcbfc76625aa60d03
SHA51245ccdf02314fe01948aa2ecddb3b50f68d5b32d8542e3a3aeaf3f2920e2285d3b75ebb81b9eb9fb9e0a446af5a3708720e07672874d5d38871dbdcd09483449c
-
Filesize
103KB
MD54d4c98eca32b14aeb074db34cd0881e4
SHA192f213d609bba05d41d6941652a88c44936663a4
SHA2564182172a01bdfc08c5cf7e8652f7d9d81858345a770e2b6b507840e4c1c7764f
SHA512959da8bbf6084e802ed366de8d240382b8a5ab2f18bc58881f42ecb7a8ed082d0e078b3ad18dbf90ac0a14cd491b5ac8b00cf1f0a266bdb7ebb8d95c5c71cacf
-
Filesize
49KB
MD50d8360781e488e250587a17fbefa646c
SHA129bc9b438efd70defa8fc45a6f8ee524143f6d04
SHA256ebff7d07efda7245192ce6ecd7767578152b515b510c887ca2880a2566071f64
SHA512940a98f282473c6f706783b41b72eccce88620e12db1f91be6425f087284746e6e10d4d9420b5e79e87ec3a2fd595b9fe301576e39a4db6bd3daa4aa93a9042e
-
Filesize
3KB
MD5fc3c88c2080884d6c995d48e172fbc4f
SHA1cb1dcc479ad2533f390786b0480f66296b847ad3
SHA2561637ce704a463bd3c91a38aa02d1030107670f91ee3f0dd4fa13d07a77ba2664
SHA5124807d3bd44a3197d1a9dcf709a1e70e1cf3bf71fe1a9fa1479441b598154c282a620208557a4415a34d23ceb4fd32dda41edbb940b46acb2f00c696648703bf1
-
Filesize
184KB
MD5a776e68f497c996788b406a3dc5089eb
SHA145bf5e512752389fe71f20b64aa344f6ca0cad50
SHA256071e26ddf5323dd9ed6671bcde89df73d78bac2336070e6cb9e3e4b93bde78d1
SHA51202b1234ad37b768b9bcba74daf16e6b45b777f340dac0b64a85166fdd793955e3d7f88a95142b603b198e504ef1173618f840511bcdb70448f71aed19c009073