Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19/01/2024, 14:49

General

  • Target

    67e35ba1e64e085fe1226951b88517dc.exe

  • Size

    651KB

  • MD5

    67e35ba1e64e085fe1226951b88517dc

  • SHA1

    42252dafdea79b21ff6385715b66fe23ef82680f

  • SHA256

    65eeb38ef21735b46b448ba2359cdf12a9f5041e8f0df7385f63be59760bc645

  • SHA512

    a6cf53d8d53e8fc2a27834bc63172ac5ffda94f02a3ef3dd0fca235f5f5c930c2271d0bd0ecf810694ea58b3ac1dbd0b72fe46dbe2b249c08f62b6ca0459f614

  • SSDEEP

    12288:1gTXomEQUwTNl1v3iWo6GPU5WJg7MPW/hrJAmNZ5DD1ovdmKNxQVvnKb0u:1KE2pzXo6GJw9/h1AmNzRoEKnQBKw

Malware Config

Extracted

Family

blustealer

Credentials

  • Protocol:
    smtp
  • Host:
    bojtai.xyz
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    (mr.GT^Eg#C6

Signatures

  • BluStealer

    A Modular information stealer written in Visual Basic.

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
    "C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
      C:\Users\Admin\AppData\Local\Temp\67e35ba1e64e085fe1226951b88517dc.exe
      2⤵
      • Suspicious use of SetWindowsHookEx
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2356-2129-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2356-2130-0x0000000000400000-0x0000000000476000-memory.dmp

    Filesize

    472KB

  • memory/2684-36-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-3-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB

  • memory/2684-4-0x00000000746C0000-0x0000000074DAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-5-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB

  • memory/2684-6-0x00000000022D0000-0x0000000002372000-memory.dmp

    Filesize

    648KB

  • memory/2684-7-0x0000000005C30000-0x0000000005CD2000-memory.dmp

    Filesize

    648KB

  • memory/2684-8-0x0000000004E60000-0x0000000004ECC000-memory.dmp

    Filesize

    432KB

  • memory/2684-9-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-10-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-12-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-18-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-16-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-14-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-22-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-24-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-28-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-26-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-20-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-30-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-34-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-38-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-0-0x0000000000940000-0x00000000009E8000-memory.dmp

    Filesize

    672KB

  • memory/2684-32-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-42-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-44-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-40-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-52-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-56-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-59-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB

  • memory/2684-58-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-54-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-50-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-48-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-63-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-61-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-46-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-65-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-73-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-71-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-69-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-67-0x0000000004E60000-0x0000000004EC6000-memory.dmp

    Filesize

    408KB

  • memory/2684-2125-0x00000000746C0000-0x0000000074DAE000-memory.dmp

    Filesize

    6.9MB

  • memory/2684-2-0x0000000004850000-0x0000000004890000-memory.dmp

    Filesize

    256KB

  • memory/2684-1-0x00000000746C0000-0x0000000074DAE000-memory.dmp

    Filesize

    6.9MB