Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
218s -
max time network
224s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe
Resource
win7-20231129-en
General
-
Target
6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe
-
Size
416KB
-
MD5
269457f620a3a0d00c2dca23c405a2d8
-
SHA1
2a841b41ce97d35de6601a148c5fb40d03062941
-
SHA256
6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1
-
SHA512
0e5e3de366f4e37a40539836379021a6bc127d209cb9f76421ee79a9c41541868d511395af8bd797b930944be1e0cb754a0fc29e8b2bfc056158420b032392d8
-
SSDEEP
6144:Z5YuR8GzWWGtJf1/NoL+TcbtnqJPMfsvJQjN+tu8BjtlLCSzE4Rx58VVFrk01:JR8GzWWSZ1g+w5qJmjNMu6h9vzE44k01
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/2716-79-0x00000000012A0000-0x0000000004AD4000-memory.dmp family_zgrat_v1 behavioral1/memory/2716-80-0x000000001EEC0000-0x000000001EFCA000-memory.dmp family_zgrat_v1 behavioral1/memory/2716-84-0x000000001E460000-0x000000001E484000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1344 u1j8.0.exe 2548 u1j8.1.exe -
Loads dropped DLL 8 IoCs
pid Process 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1j8.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1j8.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI u1j8.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 u1j8.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString u1j8.0.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2716 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2716 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2716 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2716 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2716 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 1344 u1j8.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2716 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe 2548 u1j8.1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1344 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 28 PID 1988 wrote to memory of 1344 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 28 PID 1988 wrote to memory of 1344 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 28 PID 1988 wrote to memory of 1344 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 28 PID 1988 wrote to memory of 2548 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 30 PID 1988 wrote to memory of 2548 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 30 PID 1988 wrote to memory of 2548 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 30 PID 1988 wrote to memory of 2548 1988 6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe 30 PID 2548 wrote to memory of 2716 2548 u1j8.1.exe 31 PID 2548 wrote to memory of 2716 2548 u1j8.1.exe 31 PID 2548 wrote to memory of 2716 2548 u1j8.1.exe 31 PID 2548 wrote to memory of 2716 2548 u1j8.1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe"C:\Users\Admin\AppData\Local\Temp\6530e6582e851c1ab7f42f8af1d1ebff7f4e83bec5869182d0d1eb05a34dccf1.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\u1j8.0.exe"C:\Users\Admin\AppData\Local\Temp\u1j8.0.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\u1j8.1.exe"C:\Users\Admin\AppData\Local\Temp\u1j8.1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\a156d2ee87eeb3012aacff4fcc5518f7fa0b2caa0b97ad5a5e46c2e4fdf8c5f4\7e495567f7d740eaaf91825845b0fe4b.tmp
Filesize1KB
MD5b103282589cd4609f6d830f5a875c028
SHA17748d2647669b73aaf888036f616c454d8f00660
SHA256026c32bd4aeb87adec2344452a8837ba393023fd0d32d9d7b215808509d14e21
SHA5121f2533a2a58c0eb3ba8905a251b43d598c01a9af601b99a3413ef923919aa89a7ffd1ebc58a93a1b0eaea2e4ba033a192d7712abfb229656946a9d115ebd1ce5
-
Filesize
2KB
MD518c5dd90e0be90087c868ec278918ec0
SHA1bcb07cee44f00c5c0b717f8e070e35253d0b56f7
SHA256bf72f7eb8ac43c45bb81fd8cbe24690d5ec12962421a35815c3918a293a07bcd
SHA5122d87340bc4c396cfe1cd561e84ad300c3252c874a7c105d87da9022e239632238b61fa65e47796dca9968e706a3fd24a2e995f877848acb94302a26b6d48bd5a
-
Filesize
3KB
MD5ec8d2811915a63e0159c933ddd7d00de
SHA1090fe82fd93c116a64792b4f443e96f373b64b35
SHA2569fbcf9b1676395e6c002dcdd4bcb79d4440c4815eace2396590575f150662268
SHA5124f2912b80805f849274ed06d1a38b8d8ee5d012691654daf3af8ab19e45b3f9cef347d40891cc1decafbc318b5464a80096a5c8f02fd2804e057df31b2e70d76
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954
-
Filesize
223KB
MD5280229b137b0f36f2b18b9bc7841995d
SHA1d800c8ecc758ccacfe9a91efd45904efcc17b84a
SHA25649533fc0ca008e430d35fdabab4b200a70e629e62f5b16f9157b5a82b6494536
SHA512aeb7566ad83b6b1a01e2d8f6e557a18a75a8bd4229f72cc9e1b1ffe9dd86d14469937eea221e0d436274d4444d4f1732098b98ca3ddc3c7aec65867107fbdec5