Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17/04/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe
Resource
win7-20240221-en
General
-
Target
efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe
-
Size
928KB
-
MD5
d616794167af5c88812aabaf65120fad
-
SHA1
ad1289875a05ba89cb6e10b08b95ee45bdf79d0f
-
SHA256
efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646
-
SHA512
8c2211e1472c53863d9c0bed2baf03c6ea2dd9b568480cee909a4fa157c229e3e651afc673168304bdfa875bf0eb056896dbb3906e1d66dcc8b23e4e075bceee
-
SSDEEP
24576:Jg7gUMoMnm9cU9VHb5Z763rs7u8BeV67s7nCrt8dB:vWMnGcU95nAsyTKug+
Malware Config
Extracted
netwire
212.193.30.230:6826
-
activex_autorun
false
-
copy_executable
false
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
lock_executable
false
-
offline_keylogger
false
-
password
kolabo123
-
registry_autorun
false
-
use_mutex
false
Signatures
-
Detect ZGRat V1 2 IoCs
resource yara_rule behavioral2/memory/3196-9-0x0000000006490000-0x0000000006554000-memory.dmp family_zgrat_v1 behavioral2/memory/2780-86-0x0000000006000000-0x00000000060C4000-memory.dmp family_zgrat_v1 -
NetWire RAT payload 9 IoCs
resource yara_rule behavioral2/memory/384-22-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/384-23-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/384-25-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/384-39-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/384-52-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/2176-106-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/2176-107-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/2176-112-0x0000000000400000-0x000000000044F000-memory.dmp netwire behavioral2/memory/2176-131-0x0000000000400000-0x000000000044F000-memory.dmp netwire -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation Host.exe -
Executes dropped EXE 3 IoCs
pid Process 2780 Host.exe 2176 Host.exe 4532 Host.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3196 set thread context of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 2780 set thread context of 2176 2780 Host.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3744 schtasks.exe 5092 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 1552 powershell.exe 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 1552 powershell.exe 2780 Host.exe 856 powershell.exe 2780 Host.exe 2780 Host.exe 2780 Host.exe 856 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe Token: SeDebugPrivilege 1552 powershell.exe Token: SeDebugPrivilege 2780 Host.exe Token: SeDebugPrivilege 856 powershell.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 3196 wrote to memory of 1552 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 86 PID 3196 wrote to memory of 1552 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 86 PID 3196 wrote to memory of 1552 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 86 PID 3196 wrote to memory of 3744 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 88 PID 3196 wrote to memory of 3744 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 88 PID 3196 wrote to memory of 3744 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 88 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 3196 wrote to memory of 384 3196 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 90 PID 384 wrote to memory of 2780 384 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 91 PID 384 wrote to memory of 2780 384 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 91 PID 384 wrote to memory of 2780 384 efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe 91 PID 2780 wrote to memory of 856 2780 Host.exe 92 PID 2780 wrote to memory of 856 2780 Host.exe 92 PID 2780 wrote to memory of 856 2780 Host.exe 92 PID 2780 wrote to memory of 5092 2780 Host.exe 94 PID 2780 wrote to memory of 5092 2780 Host.exe 94 PID 2780 wrote to memory of 5092 2780 Host.exe 94 PID 2780 wrote to memory of 4532 2780 Host.exe 96 PID 2780 wrote to memory of 4532 2780 Host.exe 96 PID 2780 wrote to memory of 4532 2780 Host.exe 96 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97 PID 2780 wrote to memory of 2176 2780 Host.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe"C:\Users\Admin\AppData\Local\Temp\efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vrlnli.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vrlnli" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD169.tmp"2⤵
- Creates scheduled task(s)
PID:3744
-
-
C:\Users\Admin\AppData\Local\Temp\efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe"C:\Users\Admin\AppData\Local\Temp\efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\vrlnli.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\vrlnli" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72D9.tmp"4⤵
- Creates scheduled task(s)
PID:5092
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
PID:4532
-
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"4⤵
- Executes dropped EXE
PID:2176
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD51f138313f821c356aa2f1e5c4f0dd259
SHA1c3e3ae5f2bdeeb3e57317276c08d3d205dfb783d
SHA2562fcd2d679163ddb6cafa9fe2ac525fd70bd32d266d6789c1bab887ca31dc57e5
SHA512cba4c83cb8306f83dc078afd2e7e12b14b35ef9920290a9899e32218217a0bfd99ad7d9932bdf9fa2faf3aed4e120a455df0fc7663234217666beca88ee12a17
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD50fcd6a23debbe4c02f2ba927e6b4e86a
SHA16fcb5d3fb3927b26cf6da92f0fa7991263130e59
SHA2562132c6bd5b9aba25ab70693c003af2f4da91bfceebda7760ece60785d2598acc
SHA51245b9afc6b98df90d4933a181e4567d5342a0fc215c3ff5d0f425bf97797c2c5b2494dcd70be23df6d14e1f704600bd18bd206b11253c59fa133983cdec1eb911
-
Filesize
928KB
MD5d616794167af5c88812aabaf65120fad
SHA1ad1289875a05ba89cb6e10b08b95ee45bdf79d0f
SHA256efc5c94996f4af7ae3a2d17dfc73dd7fe3f84269e73bb611e5806f2fd131a646
SHA5128c2211e1472c53863d9c0bed2baf03c6ea2dd9b568480cee909a4fa157c229e3e651afc673168304bdfa875bf0eb056896dbb3906e1d66dcc8b23e4e075bceee