Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
ros88477566tyyfh.exe
Resource
win7-20231215-en
General
-
Target
ros88477566tyyfh.exe
-
Size
986KB
-
MD5
72d6251a4815e987ed734c5143773782
-
SHA1
a2090227c03e4b034d2304f547c0b2117cf8a06f
-
SHA256
2f252c0eac5c48177618c5aa351f6fe40105c25ffae42ca0e844c8543d06d768
-
SHA512
a4d969918292ffe8d8c2daff7521a418b806311c353458c083eb0789b3d7f2baf9bffc8282101ce98f6923e5ad2d73c59a48a83f7880cf31b13b2e1ce4eda49a
-
SSDEEP
24576:pRmJkcoQricOIQxiZY1iaUGb8fbMxwkrzzUCP3fkDyGS:mJZoQrbTFZY1iaUGb8fbMuyH
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/4664-16-0x0000000002B30000-0x0000000002B86000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-21-0x0000000002D10000-0x0000000002D64000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-22-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-23-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-25-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-27-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-31-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-35-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-43-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-41-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-39-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-45-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-37-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-47-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-55-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-61-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-65-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-63-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-67-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-69-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-59-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-57-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-75-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-73-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-77-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-71-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-53-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-51-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-79-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-49-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-81-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-33-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 behavioral2/memory/4664-29-0x0000000002D10000-0x0000000002D5E000-memory.dmp family_zgrat_v1 -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 17 ip-api.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3076 set thread context of 4664 3076 ros88477566tyyfh.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4664 RegSvcs.exe 4664 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3076 ros88477566tyyfh.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4664 RegSvcs.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4664 3076 ros88477566tyyfh.exe 84 PID 3076 wrote to memory of 4664 3076 ros88477566tyyfh.exe 84 PID 3076 wrote to memory of 4664 3076 ros88477566tyyfh.exe 84 PID 3076 wrote to memory of 4664 3076 ros88477566tyyfh.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ros88477566tyyfh.exe"C:\Users\Admin\AppData\Local\Temp\ros88477566tyyfh.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\ros88477566tyyfh.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4664
-