Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10/04/2024, 15:09 UTC

General

  • Target

    ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe

  • Size

    938KB

  • MD5

    d7510192dd826e6c63266ba412c4a8c6

  • SHA1

    e51431ab4448d503db3d154d1da7bec25eb5aaac

  • SHA256

    ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28

  • SHA512

    d73107b3f061d95a10f3e2ae025bfccad587866d4ccca8a71b31d51f34119d5127ed313a96ef3fe3421939ae871575d5e7ff7fd28eb9b2ddb3eef7f29c528ebc

  • SSDEEP

    12288:xtkuv9tmvboNKAM9qPg6f0blJwoodEJLaCyi5yH6CxBX5evFmwEH07i2Yvf+vMM4:xtkuv9mENKAiGolJwooKJVyVBpeERjM4

Malware Config

Signatures

  • Detect ZGRat V2 1 IoCs
  • OutSteel

    OutSteel is a file uploader and document stealer written in AutoIT.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 18 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
    "C:\Users\Admin\AppData\Local\Temp\ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
      C:\Users\Admin\AppData\Local\Temp\ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
      2⤵
      • Enumerates connected drives
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.doc" /S /B /A
        3⤵
          PID:3016
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pdf" /S /B /A
          3⤵
            PID:2912
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppt" /S /B /A
            3⤵
              PID:2612
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
              3⤵
                PID:2368
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.xl" /S /B /A
                3⤵
                  PID:2620
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.csv" /S /B /A
                  3⤵
                    PID:2360
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rtf" /S /B /A
                    3⤵
                      PID:2776
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.dot" /S /B /A
                      3⤵
                        PID:2160
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.mdb" /S /B /A
                        3⤵
                          PID:1440
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.accdb" /S /B /A
                          3⤵
                            PID:2140
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pot" /S /B /A
                            3⤵
                              PID:1508
                            • C:\Windows\SysWOW64\cmd.exe
                              C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.pps" /S /B /A
                              3⤵
                                PID:2684
                              • C:\Windows\SysWOW64\cmd.exe
                                C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.ppa" /S /B /A
                                3⤵
                                  PID:2900
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.rar" /S /B /A
                                  3⤵
                                    PID:1708
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.zip" /S /B /A
                                    3⤵
                                      PID:1948
                                    • C:\Windows\SysWOW64\cmd.exe
                                      C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.tar" /S /B /A
                                      3⤵
                                        PID:1216
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.7z" /S /B /A
                                        3⤵
                                          PID:1244
                                        • C:\Windows\SysWOW64\cmd.exe
                                          C:\Windows\system32\cmd.exe /U /C DIR "\Users\Admin\*.txt" /S /B /A
                                          3⤵
                                            PID:1992

                                      Network

                                        No results found
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      • 45.146.165.91:8080
                                        ffad5217eb782aced4ab2c746b49891b496e1b90331ca24186f8349a5fa71a28.exe
                                        152 B
                                        3
                                      No results found

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • memory/2440-6-0x0000000074610000-0x0000000074CFE000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2440-0-0x0000000000B40000-0x0000000000C2E000-memory.dmp

                                        Filesize

                                        952KB

                                      • memory/2440-2-0x00000000046E0000-0x0000000004720000-memory.dmp

                                        Filesize

                                        256KB

                                      • memory/2440-3-0x0000000000460000-0x000000000049A000-memory.dmp

                                        Filesize

                                        232KB

                                      • memory/2440-1-0x0000000074610000-0x0000000074CFE000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2896-17-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-35-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-8-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-9-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-11-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-4-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-23-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-27-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-31-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-7-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-39-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-45-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-47-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-55-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-59-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-63-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-67-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      • memory/2896-81-0x0000000000400000-0x00000000004E2000-memory.dmp

                                        Filesize

                                        904KB

                                      We care about your privacy.

                                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.