Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
297s -
max time network
300s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
14/01/2024, 22:28
Behavioral task
behavioral1
Sample
f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe
Resource
win7-20231215-en
General
-
Target
f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe
-
Size
6.5MB
-
MD5
4ff0ddcb1ec66cab113f0c2543d91b1d
-
SHA1
0ce9704282eb3e8a0177e1eb05f726f484249ce6
-
SHA256
f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98
-
SHA512
684ac11719226f2e13fdf8e87e0d065e5d984900e943200d3ce8f02ffb54d7207ffacc96bac08b5c194c12d851bd2d2b8ebe28e6d8a8ec3ed698acfd11d8c7b7
-
SSDEEP
98304:XyO1+mSLIHtNmgwA/66IoSPdPbYcvrqqJnxXfWflBE6:Cs7NNmgp/66K1Pb1vrqqJN6/
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/4344-0-0x00000000004B0000-0x0000000000B36000-memory.dmp family_zgrat_v1 -
Detects Arechclient2 RAT 1 IoCs
Arechclient2.
resource yara_rule behavioral2/memory/4612-19-0x0000000000400000-0x00000000004D4000-memory.dmp MALWARE_Win_Arechclient -
SectopRAT payload 4 IoCs
resource yara_rule behavioral2/memory/4612-19-0x0000000000400000-0x00000000004D4000-memory.dmp family_sectoprat behavioral2/memory/4344-18-0x0000000007180000-0x0000000007280000-memory.dmp family_sectoprat behavioral2/memory/4344-17-0x0000000007180000-0x0000000007280000-memory.dmp family_sectoprat behavioral2/memory/4344-50-0x0000000007180000-0x0000000007280000-memory.dmp family_sectoprat -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Pyramids_and_prisms_in_geometry.lnk f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe -
Loads dropped DLL 1 IoCs
pid Process 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4344 set thread context of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3232 4344 WerFault.exe 73 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4612 InstallUtil.exe Token: SeDebugPrivilege 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74 PID 4344 wrote to memory of 4612 4344 f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe 74
Processes
-
C:\Users\Admin\AppData\Local\Temp\f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe"C:\Users\Admin\AppData\Local\Temp\f780d23cd2090e8dca286a13b33f6ee29dea16cc2b6f48c21195b0f877fb2c98.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4344 -s 14642⤵
- Program crash
PID:3232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD5c9ff7748d8fcef4cf84a5501e996a641
SHA102867e5010f62f97ebb0cfb32cb3ede9449fe0c9
SHA2564d3f3194cb1133437aa69bb880c8cbb55ddf06ff61a88ca6c3f1bbfbfd35d988
SHA512d36054499869a8f56ac8547ccd5455f1252c24e17d2b185955390b32da7e2a732ace4e0f30f9493fcc61425a2e31ed623465f998f41af69423ee0e3ed1483a73
-
Filesize
298KB
MD5ee8c70601dcf2350cbb2a8eac2fcc7a3
SHA130d548381db571b6d5da46ae71f1f6d6232d3870
SHA256823c648af7639d0ef94e63fc295d3473d9d188931e24fb6beafd1a2bdb77c793
SHA512e837a71b5847473b291dc1191bc1b1f5489ea5781da201244e7722c3014b4bbfd0f4fa8fcc8f292e3c3ad400222967842738d44cb18ffee445a0789b7c55c0aa