Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2024, 13:26
Behavioral task
behavioral1
Sample
90761d7a9ac41a9602b7094663921f42.exe
Resource
win7-20231215-en
General
-
Target
90761d7a9ac41a9602b7094663921f42.exe
-
Size
5.0MB
-
MD5
90761d7a9ac41a9602b7094663921f42
-
SHA1
eb2357f00f922719f261a97ca1f4350a7c3d168a
-
SHA256
29f281cac20928673a516da70a1495cf217aea2dc386d7719de2df7c2053fb9d
-
SHA512
2e5981e6a38b2b2b4f036f3056c818834160018d97a9393f7d461890fe51f0030ac2c3322c2421abc707e20ee01392bbf3058d9bba77e95ab7facfbed55cdda0
-
SSDEEP
49152:bWgm+tevgmkSG2srQHYNGFF0v9AUKoXjuqqn0F2TmoGwHP2px3V:bWgmsevgm+QQFvDXFqXRDOrV
Malware Config
Signatures
-
Detect Vidar Stealer 3 IoCs
resource yara_rule behavioral2/memory/3364-28-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 behavioral2/memory/3364-25-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 behavioral2/memory/3364-20-0x0000000000400000-0x000000000065E000-memory.dmp family_vidar_v6 -
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2988-1-0x0000000000F20000-0x000000000141E000-memory.dmp family_zgrat_v1 -
Loads dropped DLL 1 IoCs
pid Process 2988 90761d7a9ac41a9602b7094663921f42.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2988 set thread context of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 -
Program crash 1 IoCs
pid pid_target Process procid_target 4836 3364 WerFault.exe 101 -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101 PID 2988 wrote to memory of 3364 2988 90761d7a9ac41a9602b7094663921f42.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\90761d7a9ac41a9602b7094663921f42.exe"C:\Users\Admin\AppData\Local\Temp\90761d7a9ac41a9602b7094663921f42.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe2⤵PID:3364
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3364 -s 21243⤵
- Program crash
PID:4836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3364 -ip 33641⤵PID:4212
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
385KB
MD58398250f88768aed63dc3645faf2eada
SHA1148f2a54e30992ccee7b39303b8ce951c5dcd3c2
SHA2565d7302083ff67c8eeb605a129905bfa80fd3ecdb3491ba3766196e162ef4c32a
SHA512bf48880550e81d78c89e1f34275e6a573d4e2dbc9b8364ab424ebd0ee8f3cc32ba0ed260800c761610866165973e53523687c5fa92b2d48748a652aa6a8a661c