Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2024, 21:46
Behavioral task
behavioral1
Sample
1E40160FF1F09D7445F2CDCD24104701.exe
Resource
win7-20240221-en
6 signatures
150 seconds
General
-
Target
1E40160FF1F09D7445F2CDCD24104701.exe
-
Size
1.8MB
-
MD5
1e40160ff1f09d7445f2cdcd24104701
-
SHA1
c660d302b2941a93c51cd1f857298126a3c0b219
-
SHA256
f8a7cc2e3e5a8dbfaa11ddb2c1c3286eda1e906dd66c29adc5a9a6c5f7ceed9c
-
SHA512
ea3b325f2f4a75849a06859fd1f933c38abc425c542c1bd2b8b65abd7aff05a75d07caeb47656a9f699558306cc5fe789bf43cfc2c0676c5bd8d4109b0c015f0
-
SSDEEP
49152:uGkkhDESYZ24c4W3cs9gIDxH6HMfKZkQ6rQ:uGkkhDE74SR6gGHfy6
Malware Config
Signatures
-
Detect ZGRat V1 1 IoCs
resource yara_rule behavioral2/memory/2020-0-0x0000000000C00000-0x0000000000DDE000-memory.dmp family_zgrat_v1 -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe 2020 1E40160FF1F09D7445F2CDCD24104701.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2020 1E40160FF1F09D7445F2CDCD24104701.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2020 1E40160FF1F09D7445F2CDCD24104701.exe