Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    138s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 14:55

General

  • Target

    cd2cc1403cb829e7d7454a3a80d9875834bd3b0837e56493369f2d842bf3f569.exe

  • Size

    631KB

  • MD5

    eec03d362a4c66fe6ac8064ae68bda50

  • SHA1

    8aa051b9c7f201eb9504fb7023bbc5ffa2458293

  • SHA256

    cd2cc1403cb829e7d7454a3a80d9875834bd3b0837e56493369f2d842bf3f569

  • SHA512

    e6f07b5171fee9fa534f57376aaf6061e541da4ad9cee2e50b3d2ee3eed7cd2d0ed2942a479e8887dc7e4247e969b081b5ebef758854e7c62be35e2af49a8f2d

  • SSDEEP

    12288:vEZR29MfzdOwMI5F09MyMeWR+KSS2g/Pd35/K9TGH4CaxJDua:MZR29Mfzdu6LyZTIdJ/K98n6u

Score
10/10

Malware Config

Signatures

  • Detect ZGRat V1 1 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd2cc1403cb829e7d7454a3a80d9875834bd3b0837e56493369f2d842bf3f569.exe
    "C:\Users\Admin\AppData\Local\Temp\cd2cc1403cb829e7d7454a3a80d9875834bd3b0837e56493369f2d842bf3f569.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1736
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {3ED2D991-848E-479D-AF58-6FBCAEBA318E} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:S4U:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1804
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABSAG8AYQBtAGkAbgBnAFwARABlAGYAYQB1AGwAdABcAE4AYQBtAGUALgBlAHgAZQAsAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABNAGkAYwByAG8AcwBvAGYAdAAuAE4ARQBUAFwARgByAGEAbQBlAHcAbwByAGsANgA0AFwAdgA0AC4AMAAuADMAMAAzADEAOQBcAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUAIAAtAEYAbwByAGMAZQA7ACAAQQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUAByAG8AYwBlAHMAcwAgAEMAOgBcAFcAaQBuAGQAbwB3AHMAXABNAGkAYwByAG8AcwBvAGYAdAAuAE4ARQBUAFwARgByAGEAbQBlAHcAbwByAGsANgA0AFwAdgA0AC4AMAAuADMAMAAzADEAOQBcAEEAZABkAEkAbgBQAHIAbwBjAGUAcwBzAC4AZQB4AGUALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwAUgBvAGEAbQBpAG4AZwBcAEQAZQBmAGEAdQBsAHQAXABOAGEAbQBlAC4AZQB4AGUA
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2492
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {96A909F6-48A8-4531-832B-F79A4CDD0DBE} S-1-5-21-330940541-141609230-1670313778-1000:KXIPPCKF\Admin:Interactive:[1]
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Roaming\Default\Name.exe
      C:\Users\Admin\AppData\Roaming\Default\Name.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_compiler.exe
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\Default\Name.exe

    Filesize

    631KB

    MD5

    eec03d362a4c66fe6ac8064ae68bda50

    SHA1

    8aa051b9c7f201eb9504fb7023bbc5ffa2458293

    SHA256

    cd2cc1403cb829e7d7454a3a80d9875834bd3b0837e56493369f2d842bf3f569

    SHA512

    e6f07b5171fee9fa534f57376aaf6061e541da4ad9cee2e50b3d2ee3eed7cd2d0ed2942a479e8887dc7e4247e969b081b5ebef758854e7c62be35e2af49a8f2d

  • memory/1120-30-0x0000000140000000-0x00000001400A2000-memory.dmp

    Filesize

    648KB

  • memory/1120-39-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1120-32-0x000007FFFFFDF000-0x000007FFFFFE0000-memory.dmp

    Filesize

    4KB

  • memory/1120-31-0x0000000140000000-0x00000001400A2000-memory.dmp

    Filesize

    648KB

  • memory/1120-34-0x0000000140000000-0x00000001400A2000-memory.dmp

    Filesize

    648KB

  • memory/1120-28-0x0000000140000000-0x00000001400A2000-memory.dmp

    Filesize

    648KB

  • memory/1120-42-0x000000001B410000-0x000000001B490000-memory.dmp

    Filesize

    512KB

  • memory/1120-41-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1120-40-0x000000001B410000-0x000000001B490000-memory.dmp

    Filesize

    512KB

  • memory/1736-6-0x0000000002290000-0x00000000022E4000-memory.dmp

    Filesize

    336KB

  • memory/1736-5-0x0000000002240000-0x000000000228C000-memory.dmp

    Filesize

    304KB

  • memory/1736-4-0x0000000002150000-0x00000000021A6000-memory.dmp

    Filesize

    344KB

  • memory/1736-19-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1736-1-0x000007FEF5310000-0x000007FEF5CFC000-memory.dmp

    Filesize

    9.9MB

  • memory/1736-2-0x000000001B950000-0x000000001B9D0000-memory.dmp

    Filesize

    512KB

  • memory/1736-0-0x000000013FA70000-0x000000013FB12000-memory.dmp

    Filesize

    648KB

  • memory/1736-3-0x000000001B9D0000-0x000000001BAD2000-memory.dmp

    Filesize

    1.0MB

  • memory/2492-13-0x0000000001110000-0x0000000001190000-memory.dmp

    Filesize

    512KB

  • memory/2492-16-0x000007FEED2E0000-0x000007FEEDC7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2492-15-0x0000000001110000-0x0000000001190000-memory.dmp

    Filesize

    512KB

  • memory/2492-14-0x0000000000FF0000-0x0000000000FF8000-memory.dmp

    Filesize

    32KB

  • memory/2492-12-0x000007FEED2E0000-0x000007FEEDC7D000-memory.dmp

    Filesize

    9.6MB

  • memory/2492-11-0x0000000019DB0000-0x000000001A092000-memory.dmp

    Filesize

    2.9MB

  • memory/3020-27-0x00000000009B0000-0x0000000000A04000-memory.dmp

    Filesize

    336KB

  • memory/3020-29-0x000000001BBA0000-0x000000001BC20000-memory.dmp

    Filesize

    512KB

  • memory/3020-25-0x000000013F390000-0x000000013F432000-memory.dmp

    Filesize

    648KB

  • memory/3020-26-0x000000001BBA0000-0x000000001BC20000-memory.dmp

    Filesize

    512KB

  • memory/3020-36-0x000000001BBA0000-0x000000001BC20000-memory.dmp

    Filesize

    512KB

  • memory/3020-38-0x000007FEF4920000-0x000007FEF530C000-memory.dmp

    Filesize

    9.9MB

  • memory/3020-24-0x000007FEF4920000-0x000007FEF530C000-memory.dmp

    Filesize

    9.9MB