Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
5s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 09:40
Static task
static1
Behavioral task
behavioral1
Sample
412cd1f80bd9c600e3b4dc093e917f00.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
412cd1f80bd9c600e3b4dc093e917f00.exe
Resource
win10v2004-20231215-en
General
-
Target
412cd1f80bd9c600e3b4dc093e917f00.exe
-
Size
736KB
-
MD5
412cd1f80bd9c600e3b4dc093e917f00
-
SHA1
00afca16a90495345bc729115ef7bf6d69d25577
-
SHA256
1933f809c3459991a94f70f1381e2e26335207959a9cef0fad842f53331462a6
-
SHA512
0a4ed04d17b350cdf9cb7b36182caa5c2e14118338914735cf38754ce0ee745f58b11f7accc735e1d56c6ebcf21a00625b0360e467e370ffd4ba12cbad6c92fd
-
SSDEEP
12288:kPIyPKREnm9jLV2QjcZpF2w4qkzR9leeW1ZwiTVmFZDr4tsb9c5kjIMC1m+UT49R:uXCRpPjcH/4pRicFB0tsb9cUJi2TSR
Malware Config
Signatures
-
Detect ZGRat V1 35 IoCs
resource yara_rule behavioral1/memory/2512-45-0x00000000083D0000-0x0000000008440000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-67-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-97-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-109-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-107-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-105-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-103-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-101-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-99-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-95-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-93-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-91-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-89-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-87-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-85-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-83-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-81-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-79-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-77-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-75-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-73-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-71-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-69-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-65-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-63-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-61-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-59-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-57-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-55-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-53-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-51-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-49-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-47-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/2512-46-0x00000000083D0000-0x000000000843A000-memory.dmp family_zgrat_v1 behavioral1/memory/1260-2072-0x0000000000400000-0x000000000042A000-memory.dmp family_zgrat_v1 -
Runs ping.exe 1 TTPs 4 IoCs
pid Process 2140 PING.EXE 2904 PING.EXE 2864 PING.EXE 2496 PING.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\412cd1f80bd9c600e3b4dc093e917f00.exe"C:\Users\Admin\AppData\Local\Temp\412cd1f80bd9c600e3b4dc093e917f00.exe"1⤵PID:2512
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:1404
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com3⤵
- Runs ping.exe
PID:2140
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:2644
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:2552
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" ping gooogle.com2⤵PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\412cd1f80bd9c600e3b4dc093e917f00.exeC:\Users\Admin\AppData\Local\Temp\412cd1f80bd9c600e3b4dc093e917f00.exe2⤵PID:1260
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\_Zwoqghbfujejrlbnxyxjpk.vbs"2⤵PID:2204
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-MpPreference -ExclusionPath C:\,'C:\Users\Admin\AppData\Roaming\zan.exe'3⤵PID:488
-
-
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com1⤵
- Runs ping.exe
PID:2904
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com1⤵
- Runs ping.exe
PID:2864
-
C:\Windows\SysWOW64\PING.EXE"C:\Windows\system32\PING.EXE" gooogle.com1⤵
- Runs ping.exe
PID:2496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5fa279d2220149f2fe87c38762c558d6f
SHA1f506f109ed86b7db14dc4b4320d37b35c7dc4a57
SHA256fed4840eceadcb1d5af71fa857bc9ba9287fda1ba189be17fc390448303485d6
SHA51232838aa037f3e57191521f1d7114a3db9c992fe08a2db033fb3f6147a23df15f1b2e28e5885daaf773c9d53bbbdb30ec616c25ac849ef1897e108221eb5a86f1