Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 16:41
Static task
static1
Behavioral task
behavioral1
Sample
0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe
Resource
win7-20240221-en
General
-
Target
0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe
-
Size
3.3MB
-
MD5
0ff1ba8b00c5a9cb74cbbddeb8d6ce1b
-
SHA1
58ff20ceb54d0f82e448da544d0a2abda5ac1a29
-
SHA256
b01e636d6d097a9025ae2b20caa08aa9068690a78a42af4115cd8c4741910ef2
-
SHA512
6a80f5d9581efb84348b55f26ea8080d3d947b622f8f5266edd9834026347542270edd924be497b38bc40fab09e83d32bed1463504c3ac6b37587f816c8fd4d4
-
SSDEEP
98304:SQgr80abONjWZ2J1qfuj3niZ42mftWrzDw7VXIMfVFjD3pJcJpi:er80abMjx1JiSVQ41IMfLf
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/1360-0-0x0000000000840000-0x00000000008B4000-memory.dmp family_zgrat_v1 -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 1 IoCs
resource yara_rule behavioral2/memory/1360-0-0x0000000000840000-0x00000000008B4000-memory.dmp family_redline -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1360 0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1360 0ff1ba8b00c5a9cb74cbbddeb8d6ce1b.exe