Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 16:41

General

  • Target

    0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe

  • Size

    3.3MB

  • MD5

    0ff1ba8b00c5a9cb74cbbddeb8d6ce1b

  • SHA1

    58ff20ceb54d0f82e448da544d0a2abda5ac1a29

  • SHA256

    b01e636d6d097a9025ae2b20caa08aa9068690a78a42af4115cd8c4741910ef2

  • SHA512

    6a80f5d9581efb84348b55f26ea8080d3d947b622f8f5266edd9834026347542270edd924be497b38bc40fab09e83d32bed1463504c3ac6b37587f816c8fd4d4

  • SSDEEP

    98304:SQgr80abONjWZ2J1qfuj3niZ42mftWrzDw7VXIMfVFjD3pJcJpi:er80abMjx1JiSVQ41IMfLf

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine payload 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe
    "C:\Users\Admin\AppData\Local\Temp\0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1360-0-0x0000000000840000-0x00000000008B4000-memory.dmp

    Filesize

    464KB

  • memory/1360-4-0x0000000075120000-0x00000000758D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1360-5-0x0000000004DC0000-0x0000000005364000-memory.dmp

    Filesize

    5.6MB

  • memory/1360-6-0x0000000004D10000-0x0000000004DA2000-memory.dmp

    Filesize

    584KB

  • memory/1360-7-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB

  • memory/1360-8-0x0000000005500000-0x000000000550A000-memory.dmp

    Filesize

    40KB

  • memory/1360-9-0x0000000006400000-0x0000000006A18000-memory.dmp

    Filesize

    6.1MB

  • memory/1360-10-0x0000000005E50000-0x0000000005F5A000-memory.dmp

    Filesize

    1.0MB

  • memory/1360-11-0x0000000005F80000-0x0000000005F92000-memory.dmp

    Filesize

    72KB

  • memory/1360-12-0x0000000005FA0000-0x0000000005FDC000-memory.dmp

    Filesize

    240KB

  • memory/1360-13-0x0000000006000000-0x000000000604C000-memory.dmp

    Filesize

    304KB

  • memory/1360-14-0x0000000006180000-0x00000000061E6000-memory.dmp

    Filesize

    408KB

  • memory/1360-15-0x0000000007340000-0x00000000073B6000-memory.dmp

    Filesize

    472KB

  • memory/1360-16-0x00000000073E0000-0x00000000073FE000-memory.dmp

    Filesize

    120KB

  • memory/1360-17-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB

  • memory/1360-18-0x00000000088D0000-0x0000000008A92000-memory.dmp

    Filesize

    1.8MB

  • memory/1360-19-0x0000000008AA0000-0x0000000008FCC000-memory.dmp

    Filesize

    5.2MB

  • memory/1360-20-0x0000000075120000-0x00000000758D0000-memory.dmp

    Filesize

    7.7MB

  • memory/1360-21-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB

  • memory/1360-22-0x0000000005530000-0x0000000005540000-memory.dmp

    Filesize

    64KB