Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    130s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:19 UTC

General

  • Target

    ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe

  • Size

    2.2MB

  • MD5

    7dffee2932057f4ab49f2fb16fc19800

  • SHA1

    f0c4d840fcbb6c7f44d496f4c04bfc8ba88a0b1e

  • SHA256

    ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068

  • SHA512

    cffc028320cef6cefd52cc1260ae1210edafe2fed1873160e8812fd87ecaaf7183c0d0b7c8142704803de5acf9d49b18d58ccb51e1fcc0238f8bf2ee36a9c410

  • SSDEEP

    24576:DfY0lWREGo9z03OivlvI4so5YSY/aQlVqbN5pZMUqJzHKUuRZIhLvHN7oX//j5kp:jbvFZsm18YSYRgrqUqwZIfoX//j5k5h

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • outlook_office_path 1 IoCs
  • outlook_win_path 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe
    "C:\Users\Admin\AppData\Local\Temp\ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Local\Temp\ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe
      C:\Users\Admin\AppData\Local\Temp\ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe
      2⤵
      • Loads dropped DLL
      • Accesses Microsoft Outlook profiles
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • outlook_office_path
      • outlook_win_path
      PID:4676

Network

  • flag-us
    DNS
    232.168.11.51.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    232.168.11.51.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    173.178.17.96.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    173.178.17.96.in-addr.arpa
    IN PTR
    Response
    173.178.17.96.in-addr.arpa
    IN PTR
    a96-17-178-173deploystaticakamaitechnologiescom
  • flag-us
    DNS
    4.159.190.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    4.159.190.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    95.221.229.192.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    95.221.229.192.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    154.239.44.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    154.239.44.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    192.85.112.64.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    192.85.112.64.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    157.123.68.40.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    157.123.68.40.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    171.39.242.20.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    171.39.242.20.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    18.134.221.88.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    18.134.221.88.in-addr.arpa
    IN PTR
    Response
    18.134.221.88.in-addr.arpa
    IN PTR
    a88-221-134-18deploystaticakamaitechnologiescom
  • flag-us
    DNS
    240.221.184.93.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    240.221.184.93.in-addr.arpa
    IN PTR
    Response
  • flag-us
    DNS
    43.229.111.52.in-addr.arpa
    Remote address:
    8.8.8.8:53
    Request
    43.229.111.52.in-addr.arpa
    IN PTR
    Response
  • 52.142.223.178:80
    104 B
    2
  • 64.112.85.192:2055
    ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe
    32.6kB
    1.2MB
    646
    896
  • 64.112.85.192:2055
    ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe
    141.1kB
    1.9kB
    108
    47
  • 8.8.8.8:53
    232.168.11.51.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    232.168.11.51.in-addr.arpa

  • 8.8.8.8:53
    173.178.17.96.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    173.178.17.96.in-addr.arpa

  • 8.8.8.8:53
    4.159.190.20.in-addr.arpa
    dns
    71 B
    157 B
    1
    1

    DNS Request

    4.159.190.20.in-addr.arpa

  • 8.8.8.8:53
    95.221.229.192.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    95.221.229.192.in-addr.arpa

  • 8.8.8.8:53
    154.239.44.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    154.239.44.20.in-addr.arpa

  • 8.8.8.8:53
    192.85.112.64.in-addr.arpa
    dns
    72 B
    133 B
    1
    1

    DNS Request

    192.85.112.64.in-addr.arpa

  • 8.8.8.8:53
    157.123.68.40.in-addr.arpa
    dns
    72 B
    146 B
    1
    1

    DNS Request

    157.123.68.40.in-addr.arpa

  • 8.8.8.8:53
    171.39.242.20.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    171.39.242.20.in-addr.arpa

  • 8.8.8.8:53
    18.134.221.88.in-addr.arpa
    dns
    72 B
    137 B
    1
    1

    DNS Request

    18.134.221.88.in-addr.arpa

  • 8.8.8.8:53
    240.221.184.93.in-addr.arpa
    dns
    73 B
    144 B
    1
    1

    DNS Request

    240.221.184.93.in-addr.arpa

  • 8.8.8.8:53
    43.229.111.52.in-addr.arpa
    dns
    72 B
    158 B
    1
    1

    DNS Request

    43.229.111.52.in-addr.arpa

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\ccfb1b97034d2b697c953a4447b4226e83cd421487f10dc7facc56e630833068.exe.log

    Filesize

    1KB

    MD5

    e7b6147dd26e47146d74fc34cea28e7a

    SHA1

    99d24034f7c1d1ebd62304eace2a45bb4c4f4fa3

    SHA256

    de555e5d07ccebdfa711f838f87887ad0e6fa5f134e75cafd47fc8b515d02461

    SHA512

    ed8f16a07c70735e6e6c20e26e75508416efd500d9084674d665746c702715ebc70459d5af5a58cb65bcbbad4092b63c11f3643ff0c2cd3b6d22c2db25851085

  • C:\Users\Admin\AppData\Local\Temp\Costura\1485B29524EF63EB83DF771D39CCA767\64\sqlite.interop.dll

    Filesize

    1.7MB

    MD5

    02f50a23e31d1f21aa21ae52faf3c05a

    SHA1

    5b21234729dedfa1b456138872ef2a046b9ee86f

    SHA256

    5f0e72e1839db4aa41f560e0a68c7a95c9e1656bc2f4f4ff64803655d02e5272

    SHA512

    bc2fcca125506d9b762df4e9df24a907b9e554d857e705945ae252e7e6b50dada043ef0e69828b780ac9b569053fcf912c27a770469a80f1f6094c146afdb9b0

  • C:\Users\Admin\AppData\Local\Temp\Sgsnwytcn.tmp

    Filesize

    148KB

    MD5

    90a1d4b55edf36fa8b4cc6974ed7d4c4

    SHA1

    aba1b8d0e05421e7df5982899f626211c3c4b5c1

    SHA256

    7cf3e9e8619904e72ea6608cc43e9b6c9f8aa2af02476f60c2b3daf33075981c

    SHA512

    ea0838be754e1258c230111900c5937d2b0788f90bbf7c5f82b2ceda7868e50afb86c301f313267eaa912778da45755560b5434885521bf915967a7863922ae2

  • C:\Users\Admin\AppData\Local\Temp\Yxuoftr.tmp

    Filesize

    124KB

    MD5

    9618e15b04a4ddb39ed6c496575f6f95

    SHA1

    1c28f8750e5555776b3c80b187c5d15a443a7412

    SHA256

    a4cd72e529e60b5f74c50e4e5b159efaf80625f23534dd15a28203760b8b28ab

    SHA512

    f802582aa7510f6b950e3343b0560ffa9037c6d22373a6a33513637ab0f8e60ed23294a13ad8890935b02c64830b5232ba9f60d0c0fe90df02b5da30ecd7fa26

  • memory/432-51-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-3-0x0000024ED9310000-0x0000024ED941A000-memory.dmp

    Filesize

    1.0MB

  • memory/432-7-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-9-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-11-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-13-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-15-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-59-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-19-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-21-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-23-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-25-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-27-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-29-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-31-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-33-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-35-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-37-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-39-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-41-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-43-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-45-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-47-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-49-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-0-0x0000024EBE950000-0x0000024EBEB88000-memory.dmp

    Filesize

    2.2MB

  • memory/432-53-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-5-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-55-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-17-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-61-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-63-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-65-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-67-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-1118-0x0000024ED9080000-0x0000024ED9090000-memory.dmp

    Filesize

    64KB

  • memory/432-1119-0x0000024EC0750000-0x0000024EC0751000-memory.dmp

    Filesize

    4KB

  • memory/432-1120-0x0000024ED9200000-0x0000024ED92FC000-memory.dmp

    Filesize

    1008KB

  • memory/432-1121-0x0000024EC0780000-0x0000024EC07CC000-memory.dmp

    Filesize

    304KB

  • memory/432-1-0x0000024ED9090000-0x0000024ED9204000-memory.dmp

    Filesize

    1.5MB

  • memory/432-1126-0x00007FFD35370000-0x00007FFD35E31000-memory.dmp

    Filesize

    10.8MB

  • memory/432-4-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/432-2-0x00007FFD35370000-0x00007FFD35E31000-memory.dmp

    Filesize

    10.8MB

  • memory/432-57-0x0000024ED9090000-0x0000024ED91FE000-memory.dmp

    Filesize

    1.4MB

  • memory/4676-1125-0x0000000140000000-0x00000001400D6000-memory.dmp

    Filesize

    856KB

  • memory/4676-3400-0x000002C562670000-0x000002C56270E000-memory.dmp

    Filesize

    632KB

  • memory/4676-3401-0x00007FFD35370000-0x00007FFD35E31000-memory.dmp

    Filesize

    10.8MB

  • memory/4676-3402-0x000002C562860000-0x000002C562A70000-memory.dmp

    Filesize

    2.1MB

  • memory/4676-1129-0x000002C562660000-0x000002C562670000-memory.dmp

    Filesize

    64KB

  • memory/4676-3409-0x000002C562E80000-0x000002C562EEC000-memory.dmp

    Filesize

    432KB

  • memory/4676-3407-0x000002C562660000-0x000002C562670000-memory.dmp

    Filesize

    64KB

  • memory/4676-1128-0x000002C5624A0000-0x000002C5625B4000-memory.dmp

    Filesize

    1.1MB

  • memory/4676-3412-0x000002C562F70000-0x000002C562FAA000-memory.dmp

    Filesize

    232KB

  • memory/4676-3413-0x000002C562AD0000-0x000002C562AF6000-memory.dmp

    Filesize

    152KB

  • memory/4676-1127-0x00007FFD35370000-0x00007FFD35E31000-memory.dmp

    Filesize

    10.8MB

  • memory/4676-3408-0x000002C562B70000-0x000002C562BEA000-memory.dmp

    Filesize

    488KB

  • memory/4676-3454-0x00007FFD35370000-0x00007FFD35E31000-memory.dmp

    Filesize

    10.8MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.