Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
1s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
06/01/2024, 08:38
Behavioral task
behavioral1
Sample
a6eb2d0e9381ff6eb2aca7bf1d797774.exe
Resource
win7-20231129-en
8 signatures
150 seconds
General
-
Target
a6eb2d0e9381ff6eb2aca7bf1d797774.exe
-
Size
1.7MB
-
MD5
a6eb2d0e9381ff6eb2aca7bf1d797774
-
SHA1
64becc3595f0467f12e2b20bd3a34603fb7e472e
-
SHA256
10fa07a25654e8027da79c6ce9b04e2d41b68d6c7624f510e8251b4b95fd103e
-
SHA512
46f60e6d26e1cd6c3a78d842fe5258588623e7fc0dbded7ed1e3bf1baa020fb71dd75f3e77678bb71298cb59171a1150e1847daa20f10b7091724706ad567878
-
SSDEEP
24576:8s6fQKBl6XngXq9rvXdXwApsgDhhqMWUO9lmRmY7gBgT7muTYpC0M3/biezlI/s:8KRXwATqMW9y5OUJjTzl
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral1/memory/2028-0-0x0000000000A70000-0x0000000000C36000-memory.dmp family_zgrat_v1 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Windows Defender\fr-FR\winlogon.exe a6eb2d0e9381ff6eb2aca7bf1d797774.exe File created C:\Program Files\Windows Defender\fr-FR\cc11b995f2a76d a6eb2d0e9381ff6eb2aca7bf1d797774.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Media\Festival\lsass.exe a6eb2d0e9381ff6eb2aca7bf1d797774.exe File created C:\Windows\Media\Festival\6203df4a6bafc7 a6eb2d0e9381ff6eb2aca7bf1d797774.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1544 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 2028 wrote to memory of 1932 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 67 PID 2028 wrote to memory of 1932 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 67 PID 2028 wrote to memory of 1932 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 67 PID 2028 wrote to memory of 2620 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 66 PID 2028 wrote to memory of 2620 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 66 PID 2028 wrote to memory of 2620 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 66 PID 2028 wrote to memory of 2608 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 65 PID 2028 wrote to memory of 2608 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 65 PID 2028 wrote to memory of 2608 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 65 PID 2028 wrote to memory of 2584 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 64 PID 2028 wrote to memory of 2584 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 64 PID 2028 wrote to memory of 2584 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 64 PID 2028 wrote to memory of 2720 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 62 PID 2028 wrote to memory of 2720 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 62 PID 2028 wrote to memory of 2720 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 62 PID 2028 wrote to memory of 2732 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 60 PID 2028 wrote to memory of 2732 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 60 PID 2028 wrote to memory of 2732 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 60 PID 2028 wrote to memory of 2772 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 57 PID 2028 wrote to memory of 2772 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 57 PID 2028 wrote to memory of 2772 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 57 PID 2028 wrote to memory of 2752 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 56 PID 2028 wrote to memory of 2752 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 56 PID 2028 wrote to memory of 2752 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 56 PID 2028 wrote to memory of 2756 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 55 PID 2028 wrote to memory of 2756 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 55 PID 2028 wrote to memory of 2756 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 55 PID 2028 wrote to memory of 2488 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 54 PID 2028 wrote to memory of 2488 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 54 PID 2028 wrote to memory of 2488 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 54 PID 2028 wrote to memory of 2016 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 53 PID 2028 wrote to memory of 2016 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 53 PID 2028 wrote to memory of 2016 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 53 PID 2028 wrote to memory of 2876 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 52 PID 2028 wrote to memory of 2876 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 52 PID 2028 wrote to memory of 2876 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 52 PID 2028 wrote to memory of 2640 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 51 PID 2028 wrote to memory of 2640 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 51 PID 2028 wrote to memory of 2640 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 51 PID 2028 wrote to memory of 2224 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 50 PID 2028 wrote to memory of 2224 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 50 PID 2028 wrote to memory of 2224 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 50 PID 2028 wrote to memory of 2508 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 48 PID 2028 wrote to memory of 2508 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 48 PID 2028 wrote to memory of 2508 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 48 PID 2028 wrote to memory of 2680 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 28 PID 2028 wrote to memory of 2680 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 28 PID 2028 wrote to memory of 2680 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 28 PID 2028 wrote to memory of 2644 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 46 PID 2028 wrote to memory of 2644 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 46 PID 2028 wrote to memory of 2644 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 46 PID 2028 wrote to memory of 2524 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 44 PID 2028 wrote to memory of 2524 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 44 PID 2028 wrote to memory of 2524 2028 a6eb2d0e9381ff6eb2aca7bf1d797774.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6eb2d0e9381ff6eb2aca7bf1d797774.exe"C:\Users\Admin\AppData\Local\Temp\a6eb2d0e9381ff6eb2aca7bf1d797774.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Media\Festival\lsass.exe'2⤵PID:2680
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\kI7IngIRaz.bat"2⤵PID:1300
-
C:\Windows\system32\chcp.comchcp 650013⤵PID:552
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost3⤵
- Runs ping.exe
PID:1544
-
-
C:\Program Files\Windows Defender\fr-FR\winlogon.exe"C:\Program Files\Windows Defender\fr-FR\winlogon.exe"3⤵PID:2044
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\a6eb2d0e9381ff6eb2aca7bf1d797774.exe'2⤵PID:2524
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\ebbea1a2-8f1b-11ee-aa93-7ed9061e9c39\smss.exe'2⤵PID:2644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Defender\fr-FR\winlogon.exe'2⤵PID:2508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\explorer.exe'2⤵PID:2224
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\winlogon.exe'2⤵PID:2640
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'2⤵PID:2876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'2⤵PID:2016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'2⤵PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'2⤵PID:2756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'2⤵PID:2752
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'2⤵PID:2772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'2⤵PID:2732
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'2⤵PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'2⤵PID:2584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'2⤵PID:2608
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'2⤵PID:2620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:/'2⤵PID:1932
-