Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
160s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 18:49
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe
Resource
win10v2004-20240226-en
5 signatures
150 seconds
General
-
Target
9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe
-
Size
2.5MB
-
MD5
af00c05a5029f7fd7dac013bb01d220c
-
SHA1
f862ca3da392e901baf29eff5daebf57466cd62f
-
SHA256
9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455
-
SHA512
6470ef81ecbde644d9ac0dd7a38ef89671d07065311cb07887257108195c4d646557136fd0c2f620cd65525044106524f5cd649146459a84e85184f0a643b572
-
SSDEEP
24576:W3TZV5M5F3tiPNMtPcp3MAtjkwbOo9JPWCcSodJKsUpOLrF6qiz+q/pGzELEVnQx:if5G3G+tUpjjzCo/rXgKfpOLNdcWY
Malware Config
Signatures
-
Detect ZGRat V1 30 IoCs
resource yara_rule behavioral1/memory/932-14-0x0000000004D50000-0x0000000004E26000-memory.dmp family_zgrat_v1 behavioral1/memory/932-15-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-16-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-18-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-20-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-22-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-24-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-26-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-28-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-30-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-32-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-34-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-36-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-38-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-40-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-42-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-44-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-46-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-48-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-50-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-52-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-54-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-56-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-58-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-60-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-62-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-64-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-66-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-68-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 behavioral1/memory/932-70-0x0000000004D50000-0x0000000004E20000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3152 set thread context of 932 3152 9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe 107 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 932 jsc.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3152 wrote to memory of 932 3152 9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe 107 PID 3152 wrote to memory of 932 3152 9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe 107 PID 3152 wrote to memory of 932 3152 9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe 107 PID 3152 wrote to memory of 932 3152 9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe 107 PID 3152 wrote to memory of 932 3152 9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe"C:\Users\Admin\AppData\Local\Temp\9c621294c689defc4b76da675ded71aa710ab5fa20498f1d4dfa6fc1d4bc2455.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\jsc.exe2⤵
- Suspicious use of AdjustPrivilegeToken
PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=2268 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:4748