Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
163s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 01:26
Behavioral task
behavioral1
Sample
d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe
Resource
win7-20231215-en
13 signatures
150 seconds
General
-
Target
d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe
-
Size
484KB
-
MD5
b7b5b344c954ff3001df527a1cafeb14
-
SHA1
51bdf2a31e5dd5408f3dcc6f195142ff68ddeb95
-
SHA256
d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d
-
SHA512
40cfab33285325859dc28f833d1acae839d27621a36503f6653442368e9131a0c0846b15c52298ea28c41d7e906c8bf68abf28935751fa1e6c70594eaa1fdc1a
-
SSDEEP
6144:djTnt5sJVZWFMqpmUbdfcPGalT/9oXT+akWoA5P4JnTrRFucI2XFDL2gEX:djTLskMqpmkdE1lz9o/X50Trjn1eh
Malware Config
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/memory/3832-1-0x00000000003E0000-0x0000000000460000-memory.dmp family_zgrat_v1 behavioral2/memory/4804-5-0x0000000000400000-0x000000000045A000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3832 set thread context of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4804 RegAsm.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2992 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 92 PID 3832 wrote to memory of 2992 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 92 PID 3832 wrote to memory of 2992 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 92 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93 PID 3832 wrote to memory of 4804 3832 d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe"C:\Users\Admin\AppData\Local\Temp\d90447e02d86b3b7243f34abdebc6d9b918d3405b5091a4e7af3b24db63d7a7d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:2992
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4804
-