Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
7a8816516d1fd8a5ed5d776e19f55c2c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a8816516d1fd8a5ed5d776e19f55c2c.exe
Resource
win10v2004-20231215-en
General
-
Target
7a8816516d1fd8a5ed5d776e19f55c2c.exe
-
Size
638KB
-
MD5
7a8816516d1fd8a5ed5d776e19f55c2c
-
SHA1
bf2766fc7f539378e6fb0f76375fcb601015dd58
-
SHA256
a8582fec38f091e2c010b935f44d17b0357a4df55ca4b03c0c25b75640e1997c
-
SHA512
d15365f42d63f5520ad58510b453d8ad07b1648bd34e89aabe210a047722a19c4b96ce6e563a34479cfcf21f3e4b358283a745e72e370ae2c452838610bafa96
-
SSDEEP
12288:k3WjEfEioef1MQxBzi05hrsRApwRBTg0VArtwR/7gzK5:SuJUf1M2i05BwRBfVRzgW5
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2844-4-0x0000000000C30000-0x0000000000C96000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-6-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-7-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-9-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-11-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-13-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-15-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-17-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-27-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-25-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-23-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-31-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-29-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-21-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-19-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-35-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-41-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-39-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-37-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-47-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-49-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-45-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-43-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-33-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-57-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-55-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-53-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-51-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-69-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-67-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-65-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-63-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-61-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 behavioral1/memory/2844-59-0x0000000000C30000-0x0000000000C91000-memory.dmp family_zgrat_v1 -
Deletes itself 1 IoCs
pid Process 1808 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 1808 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe Token: SeDebugPrivilege 1808 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1788 7a8816516d1fd8a5ed5d776e19f55c2c.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2844 wrote to memory of 1808 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 31 PID 2844 wrote to memory of 1808 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 31 PID 2844 wrote to memory of 1808 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 31 PID 2844 wrote to memory of 1808 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 31 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33 PID 2844 wrote to memory of 1788 2844 7a8816516d1fd8a5ed5d776e19f55c2c.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8816516d1fd8a5ed5d776e19f55c2c.exe"C:\Users\Admin\AppData\Local\Temp\7a8816516d1fd8a5ed5d776e19f55c2c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Start-Sleep -s 5; Remove-Item -Path "C:\Users\Admin\AppData\Local\Temp\7a8816516d1fd8a5ed5d776e19f55c2c.exe" -Force2⤵
- Deletes itself
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\7a8816516d1fd8a5ed5d776e19f55c2c.exeC:\Users\Admin\AppData\Local\Temp\7a8816516d1fd8a5ed5d776e19f55c2c.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1788
-