Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
216s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe
Resource
win7-20240419-en
General
-
Target
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe
-
Size
372KB
-
MD5
9f712ea5a04bfae2238764f668305642
-
SHA1
864debdeec4d00430661070fc1dab479cfc8a6ef
-
SHA256
73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771
-
SHA512
25ff360b96fd99abf9e0a6afbd489e3efdf76685b246384cd61ab692a828a1ee7cc508afd95273c10b45c5b7d358bee142a860b134f75375358045bf3b1363d3
-
SSDEEP
6144:pl+08UGGfdzF7qxvwcB793ituNKkzXwGZTapV:p808UGgdtqrhauN3XwwapV
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral1/memory/2776-71-0x0000000000940000-0x0000000004174000-memory.dmp family_zgrat_v1 behavioral1/memory/2776-72-0x000000001EE30000-0x000000001EF3A000-memory.dmp family_zgrat_v1 behavioral1/memory/2776-76-0x0000000005C00000-0x0000000005C24000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 2488 urk.0.exe 2716 urk.1.exe -
Loads dropped DLL 8 IoCs
pid Process 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI urk.1.exe Key enumerated \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI urk.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI urk.1.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 urk.0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString urk.0.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2776 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2776 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2776 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2776 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2776 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe 2488 urk.0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2776 SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe 2716 urk.1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 992 wrote to memory of 2488 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 28 PID 992 wrote to memory of 2488 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 28 PID 992 wrote to memory of 2488 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 28 PID 992 wrote to memory of 2488 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 28 PID 992 wrote to memory of 2716 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 30 PID 992 wrote to memory of 2716 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 30 PID 992 wrote to memory of 2716 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 30 PID 992 wrote to memory of 2716 992 73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe 30 PID 2716 wrote to memory of 2776 2716 urk.1.exe 31 PID 2716 wrote to memory of 2776 2716 urk.1.exe 31 PID 2716 wrote to memory of 2776 2716 urk.1.exe 31 PID 2716 wrote to memory of 2776 2716 urk.1.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe"C:\Users\Admin\AppData\Local\Temp\73cf32b2f6aff72dc11d609f61ebaae2d5827f18c97b48d71fd724c19f394771.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\urk.0.exe"C:\Users\Admin\AppData\Local\Temp\urk.0.exe"2⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\urk.1.exe"C:\Users\Admin\AppData\Local\Temp\urk.1.exe"2⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\ApplicationInsights\cb82900d7c0d19605a9c1adc1be5fc0aee77ab3bfdbb4ee40526b56ef2d7a2ce\abece7e37fe14b0183258def0f13236d.tmp
Filesize1KB
MD5581ab6417e85beabf59bdb020fed14ef
SHA16b2d8280aad27b6eadc0e1686b67b182866c3a4a
SHA25692946a1a0b33dd01fb44f9cff4fbc9a5dc6e85a045a20b7fe198739e7fce7978
SHA5127a278128ee2e583c68ad336da85544085710de329b782664b2f5abad2578578e349ccf5a32c8e1820e00d21a0598422957022a757a880e56280e9b0f7d15cfc7
-
Filesize
2KB
MD57f3bb1ddf8117d41972150e8a2458ffb
SHA14bea59e788a2c283996cdbcc7a8883f0e772052c
SHA2569d146c48317e8a05d34027e15b8fd6edee892cf27597655e3eead9fe9b961206
SHA5125dc34df0568b93ed98e1c0eeea29bedf97a52b3b5a1bebc45a274fc802464a8d537e84299470794f242fdab34472fe97edec60077ae558d40a6753ba83fdd215
-
Filesize
3KB
MD5ac9ba5cf23fe94a623d1afed9cc5edb5
SHA1838fd1df09361587c6a0b9d5c86bcabe8db2fa42
SHA256b35a1c6989cddfa2c7ed053526d1b9123ef42c19b8a21398904fc8118944e8cf
SHA512efc82146386c884af8b1222adfcfdeeb90874cee77198166d841578d94551530145df30dae5f9fdf7b86370a873d38779f0e71d69fee9da53f7673df1d84f693
-
Filesize
223KB
MD5280229b137b0f36f2b18b9bc7841995d
SHA1d800c8ecc758ccacfe9a91efd45904efcc17b84a
SHA25649533fc0ca008e430d35fdabab4b200a70e629e62f5b16f9157b5a82b6494536
SHA512aeb7566ad83b6b1a01e2d8f6e557a18a75a8bd4229f72cc9e1b1ffe9dd86d14469937eea221e0d436274d4444d4f1732098b98ca3ddc3c7aec65867107fbdec5
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954