Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/01/2024, 00:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
814f22a67e6d2046f532f973f197c649.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
814f22a67e6d2046f532f973f197c649.exe
Resource
win10v2004-20231215-en
10 signatures
150 seconds
General
-
Target
814f22a67e6d2046f532f973f197c649.exe
-
Size
2.5MB
-
MD5
814f22a67e6d2046f532f973f197c649
-
SHA1
049bdddb3349ecf80c079a38297ee442190a38ad
-
SHA256
c2e1450509092251b7376c9d4acd0636b41c19060591c0ef6c3bb58ab7e49ee0
-
SHA512
696315f90cefdec65e8c2a4ca2d8f9b79fc4dce5f0bf186dd50bca398c5e9f9ea435232de639a3847460ce4331d85535a433ce7c07518977b2931ffcee6f326b
-
SSDEEP
49152:R6XZx5c96civqfPao3Hwa1VDhkYKt457bjG48GrbcE+SER:R6pxepiuR3Kt4Ra4N+1
Score
10/10
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/1320-5-0x0000000004E10000-0x0000000004E78000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-6-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-9-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-7-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-13-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-15-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-11-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-19-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-17-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-21-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-23-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-25-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-29-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-27-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-33-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-31-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-35-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-41-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-39-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-37-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-47-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-45-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-43-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-49-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-51-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-53-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-55-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-57-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-69-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-67-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-65-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-63-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-61-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 behavioral1/memory/1320-59-0x0000000004E10000-0x0000000004E72000-memory.dmp family_zgrat_v1 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\NvidiaShare = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Nvidia\\NvidiaShare.exe\"" 814f22a67e6d2046f532f973f197c649.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe 1320 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1320 814f22a67e6d2046f532f973f197c649.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2620 1320 814f22a67e6d2046f532f973f197c649.exe 30 PID 1320 wrote to memory of 2620 1320 814f22a67e6d2046f532f973f197c649.exe 30 PID 1320 wrote to memory of 2620 1320 814f22a67e6d2046f532f973f197c649.exe 30 PID 1320 wrote to memory of 2620 1320 814f22a67e6d2046f532f973f197c649.exe 30 PID 1320 wrote to memory of 2656 1320 814f22a67e6d2046f532f973f197c649.exe 31 PID 1320 wrote to memory of 2656 1320 814f22a67e6d2046f532f973f197c649.exe 31 PID 1320 wrote to memory of 2656 1320 814f22a67e6d2046f532f973f197c649.exe 31 PID 1320 wrote to memory of 2656 1320 814f22a67e6d2046f532f973f197c649.exe 31 PID 1320 wrote to memory of 2672 1320 814f22a67e6d2046f532f973f197c649.exe 32 PID 1320 wrote to memory of 2672 1320 814f22a67e6d2046f532f973f197c649.exe 32 PID 1320 wrote to memory of 2672 1320 814f22a67e6d2046f532f973f197c649.exe 32 PID 1320 wrote to memory of 2672 1320 814f22a67e6d2046f532f973f197c649.exe 32 PID 1320 wrote to memory of 2152 1320 814f22a67e6d2046f532f973f197c649.exe 33 PID 1320 wrote to memory of 2152 1320 814f22a67e6d2046f532f973f197c649.exe 33 PID 1320 wrote to memory of 2152 1320 814f22a67e6d2046f532f973f197c649.exe 33 PID 1320 wrote to memory of 2152 1320 814f22a67e6d2046f532f973f197c649.exe 33 PID 1320 wrote to memory of 2576 1320 814f22a67e6d2046f532f973f197c649.exe 34 PID 1320 wrote to memory of 2576 1320 814f22a67e6d2046f532f973f197c649.exe 34 PID 1320 wrote to memory of 2576 1320 814f22a67e6d2046f532f973f197c649.exe 34 PID 1320 wrote to memory of 2576 1320 814f22a67e6d2046f532f973f197c649.exe 34 PID 1320 wrote to memory of 1920 1320 814f22a67e6d2046f532f973f197c649.exe 35 PID 1320 wrote to memory of 1920 1320 814f22a67e6d2046f532f973f197c649.exe 35 PID 1320 wrote to memory of 1920 1320 814f22a67e6d2046f532f973f197c649.exe 35 PID 1320 wrote to memory of 1920 1320 814f22a67e6d2046f532f973f197c649.exe 35 PID 1320 wrote to memory of 2724 1320 814f22a67e6d2046f532f973f197c649.exe 36 PID 1320 wrote to memory of 2724 1320 814f22a67e6d2046f532f973f197c649.exe 36 PID 1320 wrote to memory of 2724 1320 814f22a67e6d2046f532f973f197c649.exe 36 PID 1320 wrote to memory of 2724 1320 814f22a67e6d2046f532f973f197c649.exe 36 PID 1320 wrote to memory of 2908 1320 814f22a67e6d2046f532f973f197c649.exe 37 PID 1320 wrote to memory of 2908 1320 814f22a67e6d2046f532f973f197c649.exe 37 PID 1320 wrote to memory of 2908 1320 814f22a67e6d2046f532f973f197c649.exe 37 PID 1320 wrote to memory of 2908 1320 814f22a67e6d2046f532f973f197c649.exe 37 PID 1320 wrote to memory of 2812 1320 814f22a67e6d2046f532f973f197c649.exe 38 PID 1320 wrote to memory of 2812 1320 814f22a67e6d2046f532f973f197c649.exe 38 PID 1320 wrote to memory of 2812 1320 814f22a67e6d2046f532f973f197c649.exe 38 PID 1320 wrote to memory of 2812 1320 814f22a67e6d2046f532f973f197c649.exe 38 PID 1320 wrote to memory of 2168 1320 814f22a67e6d2046f532f973f197c649.exe 39 PID 1320 wrote to memory of 2168 1320 814f22a67e6d2046f532f973f197c649.exe 39 PID 1320 wrote to memory of 2168 1320 814f22a67e6d2046f532f973f197c649.exe 39 PID 1320 wrote to memory of 2168 1320 814f22a67e6d2046f532f973f197c649.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe"C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2620
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2656
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:1920
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exeC:\Users\Admin\AppData\Local\Temp\814f22a67e6d2046f532f973f197c649.exe2⤵PID:2168
-