Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
25s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 20:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0351c004bbee5fcb8bff98b215e5e0fa.exe
Resource
win7-20231215-en
8 signatures
150 seconds
General
-
Target
0351c004bbee5fcb8bff98b215e5e0fa.exe
-
Size
717KB
-
MD5
0351c004bbee5fcb8bff98b215e5e0fa
-
SHA1
8f34d0fd5f30f964774bd393eda03192f69ad753
-
SHA256
1a72b6239f19781ae5efa519c0dbbf153ab4f175252ce5b8dc024eb2be35f041
-
SHA512
5b599cd6ef81fd1901a293f2292f0fa91b06aa02c3d8ef6c2852da774f43826a64cd97d6ed4a0758ed117cd457fe166ca9c242a562751c1f597360ebdad2d8b0
-
SSDEEP
12288:rLDrQ47uELrXJy2Mda/Rb/kOhCQBMNqjASyoJFEesBPppv4G0w0CI:/DE1yr5y2Mda/BkOhCQBMNq064Thpv4F
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral2/memory/844-10-0x0000000006330000-0x000000000639A000-memory.dmp family_zgrat_v1 behavioral2/memory/844-38-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-64-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-74-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-72-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-70-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-68-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-66-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-62-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-60-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-58-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-56-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-54-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-52-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-50-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-48-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-46-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-44-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-42-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-40-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-36-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-34-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-32-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-30-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-28-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-26-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-24-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-22-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-20-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-18-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-16-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-14-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-12-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/844-11-0x0000000006330000-0x0000000006394000-memory.dmp family_zgrat_v1 behavioral2/memory/1572-1908-0x0000000000400000-0x000000000042C000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 844 0351c004bbee5fcb8bff98b215e5e0fa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0351c004bbee5fcb8bff98b215e5e0fa.exe"C:\Users\Admin\AppData\Local\Temp\0351c004bbee5fcb8bff98b215e5e0fa.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Users\Admin\AppData\Local\Temp\0351c004bbee5fcb8bff98b215e5e0fa.exeC:\Users\Admin\AppData\Local\Temp\0351c004bbee5fcb8bff98b215e5e0fa.exe2⤵PID:1572
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Hpoxxjmijvizdoxatdiigey.vbs"2⤵PID:936
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\winsrc.exe'1⤵PID:3676