Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    131s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2024, 02:38

General

  • Target

    bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe

  • Size

    439KB

  • MD5

    f76cb49209891942d2ca806020803edc

  • SHA1

    1b1ff4a0d1113f28af22594ded0d903d1c18083f

  • SHA256

    bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d

  • SHA512

    36789735351332bc077aa5c0aeed728d2aca7cb4ad21d3c102e4ad5507a8a97775084b7d199c39d1deb36233d8cec7242aac464c4c619a92d76516ed1939b91c

  • SSDEEP

    12288:CeOQHNSzWA5z9nmoKbNlYmF/wclabxQpgEHgFbqgBr:8QH0WA5z9nhg7YmF4claaJu

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe
    "C:\Users\Admin\AppData\Local\Temp\bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell.exe" Remove-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d';New-ItemProperty -Path 'HKCU:\SOFTWARE\Microsoft\Windows\CurrentVersion\Run' -Name 'bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d' -Value '"C:\Users\Admin\AppData\Roaming\bbd5434d44d406fa4b6b57a65248414e96a50b8000c2252552e2209fab06125d.exe"' -PropertyType 'String'
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0dpis2um.t33.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1596-6289-0x00007FFFB7DE0000-0x00007FFFB88A1000-memory.dmp

    Filesize

    10.8MB

  • memory/1596-6294-0x00007FFFB7DE0000-0x00007FFFB88A1000-memory.dmp

    Filesize

    10.8MB

  • memory/1596-6291-0x000001F3F50B0000-0x000001F3F50C0000-memory.dmp

    Filesize

    64KB

  • memory/1596-6290-0x000001F3F50B0000-0x000001F3F50C0000-memory.dmp

    Filesize

    64KB

  • memory/1596-6284-0x000001F3F72A0000-0x000001F3F72C2000-memory.dmp

    Filesize

    136KB

  • memory/3044-39-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-49-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-11-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-13-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-15-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-17-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-19-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-21-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-23-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-27-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-29-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-25-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-31-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-33-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-35-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-37-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-0-0x0000000000130000-0x00000000001A4000-memory.dmp

    Filesize

    464KB

  • memory/3044-41-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-43-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-45-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-47-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-9-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-51-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-53-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-55-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-57-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-59-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-61-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-63-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-65-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-67-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-6278-0x00007FFFB7DE0000-0x00007FFFB88A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-7-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-5-0x000000001AE90000-0x000000001AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3044-4-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-3-0x0000000002210000-0x00000000022E7000-memory.dmp

    Filesize

    860KB

  • memory/3044-2-0x00007FFFB7DE0000-0x00007FFFB88A1000-memory.dmp

    Filesize

    10.8MB

  • memory/3044-1-0x0000000002210000-0x00000000022EC000-memory.dmp

    Filesize

    880KB

  • memory/3044-6296-0x000000001AE90000-0x000000001AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3044-6297-0x000000001AE90000-0x000000001AEA0000-memory.dmp

    Filesize

    64KB

  • memory/3044-6298-0x000000001AE90000-0x000000001AEA0000-memory.dmp

    Filesize

    64KB