Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 02:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
17d2d7a34d73f7c0f2d2cafb81b6ba1cdf8650128e4f4e16b235ee91c055f8ec.exe
Resource
win7-20240221-en
2 signatures
150 seconds
General
-
Target
17d2d7a34d73f7c0f2d2cafb81b6ba1cdf8650128e4f4e16b235ee91c055f8ec.exe
-
Size
420KB
-
MD5
f7df4504c2f86d6fecbb5b29e5d9fa50
-
SHA1
47ce06baa2697338c999c935cbcb26da87b5c5a1
-
SHA256
17d2d7a34d73f7c0f2d2cafb81b6ba1cdf8650128e4f4e16b235ee91c055f8ec
-
SHA512
963916199c71b20edb4379e86234cc2b62fa37aca9c0627ce804314118d080b39d1c51845c9b3ef6e0af7373198c76c58c394e5e59a897c5dbba4d5fd53c7a0f
-
SSDEEP
12288:5mAhS1SIgASSpx5p32doxi8JQx6y5CKLUUQhdKOZPx2u:0AhxAJpxj3RX8hxjtOB4
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/1036-1-0x000000001B200000-0x000000001B2D6000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-4-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-5-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-7-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-9-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-11-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-13-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-15-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-17-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-19-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-21-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-27-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-25-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-23-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-29-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-31-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-33-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-35-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-37-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-41-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-39-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-43-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-45-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-47-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-49-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-51-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-55-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-53-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-57-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-59-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-61-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-65-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-63-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1 behavioral2/memory/1036-67-0x000000001B200000-0x000000001B2D0000-memory.dmp family_zgrat_v1