Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
22/04/2024, 19:50
Static task
static1
Behavioral task
behavioral1
Sample
6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe
Resource
win10v2004-20240412-en
General
-
Target
6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe
-
Size
415KB
-
MD5
e5275f8122aab0d7a885a8061a48d4be
-
SHA1
ef0bd3810a033fe75c4037277aa6d5d6f1f1b50b
-
SHA256
6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a
-
SHA512
da3ec68b20d7c041e1822392772f9b503d8e45de9f9f22d4a97fb9af31c70e069bb333f2edfd6fb7b7561584c4d7c550fa2cc8271211e13be26fd2cace3dbad3
-
SSDEEP
6144:VaNECqw6PzNoNBIoZDDf/id53ndJaFxLVZ54gVKsIJ56:VaNd67Ovh+itSLsO6
Malware Config
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/2464-191-0x000001B8C57F0000-0x000001B8C90E8000-memory.dmp family_zgrat_v1 behavioral1/memory/2464-193-0x000001B8E39D0000-0x000001B8E3AE0000-memory.dmp family_zgrat_v1 behavioral1/memory/2464-197-0x000001B8E37B0000-0x000001B8E37D4000-memory.dmp family_zgrat_v1 -
SectopRAT payload 1 IoCs
resource yara_rule behavioral1/memory/3664-147-0x0000000000950000-0x0000000000A16000-memory.dmp family_sectoprat -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation u2w0.1.exe -
Executes dropped EXE 5 IoCs
pid Process 2044 u2w0.0.exe 4456 Qg_Appv5.exe 4860 ptInst.exe 4536 ptInst.exe 3548 u2w0.1.exe -
Loads dropped DLL 9 IoCs
pid Process 4860 ptInst.exe 4860 ptInst.exe 4860 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4536 set thread context of 4924 4536 ptInst.exe 107 PID 4924 set thread context of 3664 4924 cmd.exe 114 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1944 2044 WerFault.exe 93 2688 3744 WerFault.exe 85 -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2w0.1.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2w0.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u2w0.1.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 4456 Qg_Appv5.exe 4456 Qg_Appv5.exe 4456 Qg_Appv5.exe 4456 Qg_Appv5.exe 4456 Qg_Appv5.exe 4860 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe 4536 ptInst.exe 4924 cmd.exe 4924 cmd.exe 4924 cmd.exe 4924 cmd.exe 3664 MSBuild.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4536 ptInst.exe 4924 cmd.exe 4924 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3664 MSBuild.exe Token: SeDebugPrivilege 2464 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe 3548 u2w0.1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3664 MSBuild.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 3744 wrote to memory of 2044 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 93 PID 3744 wrote to memory of 2044 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 93 PID 3744 wrote to memory of 2044 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 93 PID 3744 wrote to memory of 4456 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 104 PID 3744 wrote to memory of 4456 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 104 PID 3744 wrote to memory of 4456 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 104 PID 4456 wrote to memory of 4860 4456 Qg_Appv5.exe 105 PID 4456 wrote to memory of 4860 4456 Qg_Appv5.exe 105 PID 4456 wrote to memory of 4860 4456 Qg_Appv5.exe 105 PID 4860 wrote to memory of 4536 4860 ptInst.exe 106 PID 4860 wrote to memory of 4536 4860 ptInst.exe 106 PID 4860 wrote to memory of 4536 4860 ptInst.exe 106 PID 4536 wrote to memory of 4924 4536 ptInst.exe 107 PID 4536 wrote to memory of 4924 4536 ptInst.exe 107 PID 4536 wrote to memory of 4924 4536 ptInst.exe 107 PID 4536 wrote to memory of 4924 4536 ptInst.exe 107 PID 4924 wrote to memory of 3664 4924 cmd.exe 114 PID 4924 wrote to memory of 3664 4924 cmd.exe 114 PID 4924 wrote to memory of 3664 4924 cmd.exe 114 PID 4924 wrote to memory of 3664 4924 cmd.exe 114 PID 3744 wrote to memory of 3548 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 115 PID 3744 wrote to memory of 3548 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 115 PID 3744 wrote to memory of 3548 3744 6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe 115 PID 4924 wrote to memory of 3664 4924 cmd.exe 114 PID 3548 wrote to memory of 2464 3548 u2w0.1.exe 118 PID 3548 wrote to memory of 2464 3548 u2w0.1.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe"C:\Users\Admin\AppData\Local\Temp\6e7769e568d74e614b7db671d0dde4fda876c191826d534bebefc59c6f681a1a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\u2w0.0.exe"C:\Users\Admin\AppData\Local\Temp\u2w0.0.exe"2⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 12763⤵
- Program crash
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"C:\Users\Admin\AppData\Local\Temp\Qg_Appv5.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Local\Temp\Uninstallcheck_alpha\ptInst.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exeC:\Users\Admin\AppData\Roaming\Uninstallcheck_alpha\ptInst.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe6⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2w0.1.exe"C:\Users\Admin\AppData\Local\Temp\u2w0.1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 16722⤵
- Program crash
PID:2688
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2044 -ip 20441⤵PID:2844
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 3744 -ip 37441⤵PID:3188
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.6MB
MD5862bf3003dca41d88ac49a6846149623
SHA1b34f1d42dd0649d6b83f9a92124a554f48df0434
SHA25650c10789db130a98c63e6e7f6e23b1c89b38c5ea4678f1e06fd1796fba25c75c
SHA512fe5ab7888633dbfecca57ecd1732360796c2f19c62fc4282e2a92e9b8b440cc01e25b7a0c6a608cf9c2e9c9e3c49a8509a08851afcaef7e1afc21c0abcc2c969
-
Filesize
590KB
MD563206e3b4f1fa4dcfbe1f2cc5d0c4e9d
SHA1fe731b2e9c296d9ecc75ed96c2d29fe46c7cd924
SHA2568f5b8645b5e5ea48acc411b21a1b3cd56d2660ac931989b9f064c8ff82039885
SHA51232bdcce9e8e7f1ebe50e114f65f762391d52f482a112515ccb16b09653b93873528ea1a7473a2512075bf8f729997a65f455bf6599482e997b85e06a2f87f3d6
-
Filesize
79KB
MD58e1bbc6d6c4d207393b59853f73945ae
SHA1b66d632eae41267175bf5332d43a785dd929d79f
SHA256b04725aaa99b27e04c02bec7d98fb4511331ea53761272325fff9c27a679e279
SHA5121b45a7be00f54498df289641745ca6ee99e11d63100fb838b96c2d9412f8b5f0ea5aa8b964f32a4f9182cd599765f5ca08b91e8e8eecd06d1c53543284a59001
-
Filesize
427KB
MD571a0aa2d05e9174cefd568347bd9c70f
SHA1cb9247a0fa59e47f72df7d1752424b33a903bbb2
SHA256fdb3d86c512adff90967cb860d02a4682850ab96727f0376e4d4836504c50e47
SHA5126e65520528facaa4058720eb16d6bfdcc7bb36923b7e8e6551f3526709f0fabafab123999e618438e6abe7efed4a1332547cfc988f2b24b0e3d91198b95a911a
-
Filesize
938KB
MD5b15bac961f62448c872e1dc6d3931016
SHA11dcb61babb08fe5db711e379cb67335357a5db82
SHA256bf1a0c67b433f52ebd304553f022baa34bfbca258c932d2b4b8b956b1467bfa5
SHA512932119f7dc6710239481c80ad8baaed5c14a2085fcc514b6522671b1a4ebbaf488e43453f11d5aaf6dcef7a245db8de44d93ff255f7cf8385b7d00f31f2cc370
-
Filesize
1.3MB
MD53bee67dd0e04559c8fdc7761336dee47
SHA1027ef9dca01fb928db79e57b418130165f06ed5f
SHA25657745aba2885cf8bf770e7e9195697c05e35333417ca23af153367bf31cbf812
SHA51235fb66f98a57b0d14c3044a91abac3e0670d516edfd691d6670df034e8454c550d3d2e702ab90cd32b70fcba8aeb2e02b7b3a07b6a340a932738968473f77dce
-
Filesize
81KB
MD516b26bc43943531d7d7e379632ed4e63
SHA1565287de39649e59e653a3612478c2186096d70a
SHA256346f72c9a7584c2ab6ce65cd38a616c77ebddc0bbab2274c4e89dd5e62237517
SHA512b5b7b4b8c5ab4276a34956e43f586272b1803ec3609253fee1bcc0a549aed7ba11d47404b023f7b67af701726bab95cca55738e7bd5bca272eca5ac71bb418cc
-
Filesize
3.8MB
MD513418f74a7ce25cdd6997c9fcb718a0e
SHA1f4c880821fee72c37c882b1e8ebf100efcafe31c
SHA256a890935a36903669f35522c85c75e296404a4595453f060398cb64c5b0d6dfd0
SHA51259017162877bbbdf823450a946e3e54e9130d8ebbf5baba24471c68a10d1fad3452be08c693cd7a78d0bf2fcfd6d3086edeec1a379f9b53fd66bb246c128d4c1
-
Filesize
1.4MB
MD5f521d0853daf51aa3d072e0e3f2d1999
SHA12548d34595d9502baeb2b9c41496b8b5040f7bae
SHA25671eeffc1085f1fed3fbdd84d328e92020900a1f9fe4ff8fec383f7f5ca5a5b6e
SHA512a9311e7844becb3ef03d33ba34ba047220fdb55b36587af76c45b81751a81b503e10b522d26051b6a8b49de9065ecc974741cf5098e42ae011acc32b0d0b0610
-
Filesize
3KB
MD5c6dd4a2b678d77b29d9fa67b35932c61
SHA197b0caaa4b77a80c7b110acb514505e4bbd9333d
SHA25643e7e7ec7d2a8c7e62f84bffcf696d3e372b312e2aff15d8f8a2981f9f2b3596
SHA512599e69d09f0f3d0d0a754941a798244c4864505c3703cd5e0fdfd3535968c60f0657b5bdfa88fda8c6a5e4ec9284a447c7a8f9cc87dacb1e52661f6248c2781c
-
Filesize
20KB
MD542c395b8db48b6ce3d34c301d1eba9d5
SHA1b7cfa3de344814bec105391663c0df4a74310996
SHA2565644546ecefc6786c7be5b1a89e935e640963ccd34b130f21baab9370cb9055d
SHA5127b9214db96e9bec8745b4161a41c4c0520cdda9950f0cd3f12c7744227a25d639d07c0dd68b552cf1e032181c2e4f8297747f27bad6c7447b0f415a86bd82845
-
Filesize
20KB
MD549693267e0adbcd119f9f5e02adf3a80
SHA13ba3d7f89b8ad195ca82c92737e960e1f2b349df
SHA256d76e7512e496b7c8d9fcd3010a55e2e566881dc6dacaf0343652a4915d47829f
SHA512b4b9fcecf8d277bb0ccbb25e08f3559e3fc519d85d8761d8ad5bca983d04eb55a20d3b742b15b9b31a7c9187da40ad5c48baa7a54664cae4c40aa253165cbaa2
-
Filesize
270KB
MD50951f2c80179ee8fc3ce96f8113ffe42
SHA1cca70fa747800d42b722743b00cb1b3f71f63f61
SHA2566a15721740f9ba4bce8940122998d69c51e0a4bb9ae84b3be0cc9a6d39283320
SHA512721f180c9a14b8e18d59f4051eee9f9ba9adc4babb950aad796407f2b4d066f9af6a646cef54616c1289f3788f640f6a4c3e6dccdd2fe3bde79fced7f5aef1d7
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954