Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 02:24

General

  • Target

    d8a2d92eeedda7214767ae29df6fae9e8793f9207a26db3bd346af2d3d50cbca.exe

  • Size

    3.5MB

  • MD5

    1b386f1c6ccf7750b146172492951092

  • SHA1

    fa4ebd833978504374bbf60ce568b5937ee60ed7

  • SHA256

    d8a2d92eeedda7214767ae29df6fae9e8793f9207a26db3bd346af2d3d50cbca

  • SHA512

    0ea7a2560ba07013f37230a35695eacb72dbdfc85fbcacfda49a6cd71e10e2835f2670f70017f00942f329f86ae5a17433b8d4ea51a94ae9cbc983eed7cc356d

  • SSDEEP

    98304:g1tWjfqEY30GmmBJgTnOgXO3DxtRQUFwX:g1tWjyETaJgTnOgXIxtqQw

Malware Config

Signatures

  • Detect ZGRat V1 2 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Detects executables packed with unregistered version of .NET Reactor 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8a2d92eeedda7214767ae29df6fae9e8793f9207a26db3bd346af2d3d50cbca.exe
    "C:\Users\Admin\AppData\Local\Temp\d8a2d92eeedda7214767ae29df6fae9e8793f9207a26db3bd346af2d3d50cbca.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4056
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5dLFSlB1VK.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:940
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:3912
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:1600
          • C:\odt\RuntimeBroker.exe
            "C:\odt\RuntimeBroker.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:5080
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3720 --field-trial-handle=2252,i,16504368816373493055,9578615028378602855,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4552
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 14 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4428
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4380
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 8 /tr "'C:\Users\Public\AccountPictures\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4936
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 11 /tr "'C:\odt\backgroundTaskHost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:3752
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "backgroundTaskHost" /sc ONLOGON /tr "'C:\odt\backgroundTaskHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4280
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "backgroundTaskHostb" /sc MINUTE /mo 7 /tr "'C:\odt\backgroundTaskHost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1348
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 12 /tr "'C:\odt\RuntimeBroker.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4432
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBroker" /sc ONLOGON /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:3036
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "RuntimeBrokerR" /sc MINUTE /mo 13 /tr "'C:\odt\RuntimeBroker.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:1200
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 5 /tr "'C:\odt\SppExtComObj.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:5104
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SppExtComObj" /sc ONLOGON /tr "'C:\odt\SppExtComObj.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4436
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "SppExtComObjS" /sc MINUTE /mo 10 /tr "'C:\odt\SppExtComObj.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4736
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 14 /tr "'C:\Program Files (x86)\Windows Media Player\de-DE\sihost.exe'" /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4028
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sihost" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Media Player\de-DE\sihost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:4388
        • C:\Windows\system32\schtasks.exe
          schtasks.exe /create /tn "sihosts" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Media Player\de-DE\sihost.exe'" /rl HIGHEST /f
          1⤵
          • Process spawned unexpected child process
          • Creates scheduled task(s)
          PID:3352

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Windows Media Player\de-DE\sihost.exe

          Filesize

          3.5MB

          MD5

          1b386f1c6ccf7750b146172492951092

          SHA1

          fa4ebd833978504374bbf60ce568b5937ee60ed7

          SHA256

          d8a2d92eeedda7214767ae29df6fae9e8793f9207a26db3bd346af2d3d50cbca

          SHA512

          0ea7a2560ba07013f37230a35695eacb72dbdfc85fbcacfda49a6cd71e10e2835f2670f70017f00942f329f86ae5a17433b8d4ea51a94ae9cbc983eed7cc356d

        • C:\Users\Admin\AppData\Local\Temp\5dLFSlB1VK.bat

          Filesize

          200B

          MD5

          d9d1b5a3323ef4c701b8e16f17c35ad5

          SHA1

          0485b2470ec129861619ce6d1bb478da0022c2ff

          SHA256

          1fc4aafb26ff81ca01a094cf5b0cbe4529261694828d511a168547e70cdfaca9

          SHA512

          ffec6b2c06a1d5c943c3fe89c7a5c9763e5fa8e88c4ba05fdd3925af9879a2ca6d512668124a0d980879d42b0668d4955e2794eedec737e03daa41f4b14b2aa0

        • memory/4056-0-0x0000000000390000-0x0000000000718000-memory.dmp

          Filesize

          3.5MB

        • memory/4056-1-0x00007FFC4DB50000-0x00007FFC4E611000-memory.dmp

          Filesize

          10.8MB

        • memory/4056-2-0x000000001B350000-0x000000001B360000-memory.dmp

          Filesize

          64KB

        • memory/4056-3-0x0000000002760000-0x0000000002761000-memory.dmp

          Filesize

          4KB

        • memory/4056-4-0x000000001B350000-0x000000001B360000-memory.dmp

          Filesize

          64KB

        • memory/4056-5-0x000000001B350000-0x000000001B360000-memory.dmp

          Filesize

          64KB

        • memory/4056-6-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp

          Filesize

          760KB

        • memory/4056-7-0x00007FFC6CB50000-0x00007FFC6CB51000-memory.dmp

          Filesize

          4KB

        • memory/4056-9-0x000000001BFE0000-0x000000001C006000-memory.dmp

          Filesize

          152KB

        • memory/4056-10-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp

          Filesize

          760KB

        • memory/4056-12-0x000000001B2D0000-0x000000001B2DE000-memory.dmp

          Filesize

          56KB

        • memory/4056-13-0x00007FFC4DB50000-0x00007FFC4E611000-memory.dmp

          Filesize

          10.8MB

        • memory/4056-15-0x00007FFC6CB30000-0x00007FFC6CB31000-memory.dmp

          Filesize

          4KB

        • memory/4056-14-0x00007FFC6CB40000-0x00007FFC6CB41000-memory.dmp

          Filesize

          4KB

        • memory/4056-17-0x000000001C010000-0x000000001C02C000-memory.dmp

          Filesize

          112KB

        • memory/4056-18-0x000000001C080000-0x000000001C0D0000-memory.dmp

          Filesize

          320KB

        • memory/4056-19-0x00007FFC6CB20000-0x00007FFC6CB21000-memory.dmp

          Filesize

          4KB

        • memory/4056-21-0x000000001B320000-0x000000001B330000-memory.dmp

          Filesize

          64KB

        • memory/4056-22-0x000000001B350000-0x000000001B360000-memory.dmp

          Filesize

          64KB

        • memory/4056-23-0x00007FFC6CB10000-0x00007FFC6CB11000-memory.dmp

          Filesize

          4KB

        • memory/4056-25-0x000000001C030000-0x000000001C048000-memory.dmp

          Filesize

          96KB

        • memory/4056-28-0x00007FFC6CB00000-0x00007FFC6CB01000-memory.dmp

          Filesize

          4KB

        • memory/4056-27-0x000000001B330000-0x000000001B340000-memory.dmp

          Filesize

          64KB

        • memory/4056-29-0x00007FFC6CAF0000-0x00007FFC6CAF1000-memory.dmp

          Filesize

          4KB

        • memory/4056-31-0x000000001B340000-0x000000001B350000-memory.dmp

          Filesize

          64KB

        • memory/4056-32-0x000000001B350000-0x000000001B360000-memory.dmp

          Filesize

          64KB

        • memory/4056-33-0x00007FFC6CAE0000-0x00007FFC6CAE1000-memory.dmp

          Filesize

          4KB

        • memory/4056-35-0x000000001C050000-0x000000001C05E000-memory.dmp

          Filesize

          56KB

        • memory/4056-36-0x000000001B350000-0x000000001B360000-memory.dmp

          Filesize

          64KB

        • memory/4056-37-0x00007FFC6CAD0000-0x00007FFC6CAD1000-memory.dmp

          Filesize

          4KB

        • memory/4056-39-0x000000001C0D0000-0x000000001C0E2000-memory.dmp

          Filesize

          72KB

        • memory/4056-42-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp

          Filesize

          760KB

        • memory/4056-41-0x000000001C060000-0x000000001C070000-memory.dmp

          Filesize

          64KB

        • memory/4056-43-0x00007FFC6CAC0000-0x00007FFC6CAC1000-memory.dmp

          Filesize

          4KB

        • memory/4056-45-0x000000001C110000-0x000000001C126000-memory.dmp

          Filesize

          88KB

        • memory/4056-46-0x00007FFC6CAB0000-0x00007FFC6CAB1000-memory.dmp

          Filesize

          4KB

        • memory/4056-49-0x00007FFC6CAA0000-0x00007FFC6CAA1000-memory.dmp

          Filesize

          4KB

        • memory/4056-48-0x000000001C130000-0x000000001C142000-memory.dmp

          Filesize

          72KB

        • memory/4056-50-0x000000001C680000-0x000000001CBA8000-memory.dmp

          Filesize

          5.2MB

        • memory/4056-51-0x00007FFC6CA90000-0x00007FFC6CA91000-memory.dmp

          Filesize

          4KB

        • memory/4056-53-0x000000001C070000-0x000000001C07E000-memory.dmp

          Filesize

          56KB

        • memory/4056-54-0x00007FFC6CA80000-0x00007FFC6CA81000-memory.dmp

          Filesize

          4KB

        • memory/4056-56-0x000000001C0F0000-0x000000001C100000-memory.dmp

          Filesize

          64KB

        • memory/4056-59-0x00007FFC6C890000-0x00007FFC6C891000-memory.dmp

          Filesize

          4KB

        • memory/4056-58-0x000000001C100000-0x000000001C110000-memory.dmp

          Filesize

          64KB

        • memory/4056-62-0x00007FFC6C880000-0x00007FFC6C881000-memory.dmp

          Filesize

          4KB

        • memory/4056-61-0x000000001C1B0000-0x000000001C20A000-memory.dmp

          Filesize

          360KB

        • memory/4056-63-0x00007FFC6C7C0000-0x00007FFC6C7C1000-memory.dmp

          Filesize

          4KB

        • memory/4056-65-0x000000001C150000-0x000000001C15E000-memory.dmp

          Filesize

          56KB

        • memory/4056-66-0x00007FFC6C7B0000-0x00007FFC6C7B1000-memory.dmp

          Filesize

          4KB

        • memory/4056-68-0x000000001C160000-0x000000001C170000-memory.dmp

          Filesize

          64KB

        • memory/4056-69-0x00007FFC6C5F0000-0x00007FFC6C5F1000-memory.dmp

          Filesize

          4KB

        • memory/4056-71-0x000000001C170000-0x000000001C17E000-memory.dmp

          Filesize

          56KB

        • memory/4056-72-0x00007FFC6C5E0000-0x00007FFC6C5E1000-memory.dmp

          Filesize

          4KB

        • memory/4056-74-0x000000001C210000-0x000000001C228000-memory.dmp

          Filesize

          96KB

        • memory/4056-75-0x00007FFC6C5D0000-0x00007FFC6C5D1000-memory.dmp

          Filesize

          4KB

        • memory/4056-77-0x000000001C280000-0x000000001C2CE000-memory.dmp

          Filesize

          312KB

        • memory/4056-93-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp

          Filesize

          760KB

        • memory/4056-95-0x00007FFC4DB50000-0x00007FFC4E611000-memory.dmp

          Filesize

          10.8MB

        • memory/5080-99-0x00007FFC4DB50000-0x00007FFC4E611000-memory.dmp

          Filesize

          10.8MB

        • memory/5080-100-0x000000001B470000-0x000000001B471000-memory.dmp

          Filesize

          4KB

        • memory/5080-102-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp

          Filesize

          760KB

        • memory/5080-103-0x00007FFC6CB60000-0x00007FFC6CC1E000-memory.dmp

          Filesize

          760KB

        • memory/5080-104-0x00007FFC6CB50000-0x00007FFC6CB51000-memory.dmp

          Filesize

          4KB

        • memory/5080-147-0x000000001B7F0000-0x000000001B7F8000-memory.dmp

          Filesize

          32KB