Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
8s -
max time network
5s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
12/04/2024, 15:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.exe
Resource
win7-20240215-en
15 signatures
150 seconds
Errors
Reason
Machine shutdown
General
-
Target
SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.exe
-
Size
940KB
-
MD5
6e45b98d4ffb2d2b229f395272e35f99
-
SHA1
d8492fa2ca7ad3f1bd081ff43aa326fc65fc4311
-
SHA256
758600c927adb10386bfad3863e5fd950edf6340214628e5ea9260ddb994ac86
-
SHA512
ab71b249dbc676e72a9e27074c6b043af30bf4ceb2d157062879982273336dc1cbf6604e730bc343f9c71353cf171998f6d116f78ed4fa08bcc3d01dd17838ce
-
SSDEEP
24576:sBe5pdi9+vEJzbFHahHGP9S648nOUdP0P:3ezZahHL1PUy
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/3884-3-0x000001C61E760000-0x000001C61E9B6000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-4-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-5-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-7-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-9-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-11-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-13-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-15-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-17-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-19-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-21-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-23-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-25-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-27-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-29-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-31-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-33-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-35-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-37-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-39-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-41-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-43-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-45-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-47-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-49-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-51-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-53-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-55-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-57-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-59-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-61-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-63-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-65-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 behavioral2/memory/3884-67-0x000001C61E760000-0x000001C61E9B0000-memory.dmp family_zgrat_v1 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3884 SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.exe