Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
2s -
max time network
128s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/05/2024, 23:52
Static task
static1
Behavioral task
behavioral1
Sample
9e207b9ccdca9e8dcf77295a5ca62e7245f48a9b86b4e8b659d63719a70960f0.exe
Resource
win10v2004-20240508-en
General
-
Target
9e207b9ccdca9e8dcf77295a5ca62e7245f48a9b86b4e8b659d63719a70960f0.exe
-
Size
365KB
-
MD5
493cf2ea13df55a095a64e890695cf3b
-
SHA1
0bec79b9fd343195ad28748bdcfb3a6273487b37
-
SHA256
9e207b9ccdca9e8dcf77295a5ca62e7245f48a9b86b4e8b659d63719a70960f0
-
SHA512
db5fcde0ba6d77cb55b08336de8bf1f1b87a742ba1a073dc2e2c8015cf0b961513e1f771ced5c98ff9dd4bdc0c3aafb2f1edfdf84276e65aed9022920657681d
-
SSDEEP
6144:mfcBWeUkksvXwBbM4HxlzmJp2C5kbX1Z0DR7M1jTs5gYTmWM:mfcUeGzhHxNQKX1eDR7un0mWM
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Signatures
-
Detect ZGRat V1 3 IoCs
resource yara_rule behavioral2/memory/2332-64-0x000002AA48A90000-0x000002AA4C2C4000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-69-0x000002AA66B30000-0x000002AA66B54000-memory.dmp family_zgrat_v1 behavioral2/memory/2332-65-0x000002AA66A20000-0x000002AA66B2A000-memory.dmp family_zgrat_v1 -
Downloads MZ/PE file
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4820 3344 WerFault.exe 76 4880 3512 WerFault.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e207b9ccdca9e8dcf77295a5ca62e7245f48a9b86b4e8b659d63719a70960f0.exe"C:\Users\Admin\AppData\Local\Temp\9e207b9ccdca9e8dcf77295a5ca62e7245f48a9b86b4e8b659d63719a70960f0.exe"1⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\u2kw.0.exe"C:\Users\Admin\AppData\Local\Temp\u2kw.0.exe"2⤵PID:3512
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 13043⤵
- Program crash
PID:4880
-
-
-
C:\Users\Admin\AppData\Local\Temp\u2kw.1.exe"C:\Users\Admin\AppData\Local\Temp\u2kw.1.exe"2⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe"C:\Users\Admin\AppData\Local\Temp\iolo\dm\SystemMechanic_5488CB36-BE62-4606-B07B-2EE938868BD1.exe" /eieci=11A12794-499E-4FA0-A281-A9A9AA8B2685 /eipi=5488CB36-BE62-4606-B07B-2EE938868BD13⤵PID:2332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3344 -s 9762⤵
- Program crash
PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3344 -ip 33441⤵PID:2808
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3512 -ip 35121⤵PID:416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5ac3b1a30e96b6d89ce98a21bb5b2093a
SHA14270104678195b8cad3520a704c556155a0a65b5
SHA256803946c2712aec2b60b54b3cd7c3375a9a0158e7ccbfbd4ab8a66e6ddfc7d463
SHA51265e74527ffa9d6e776d063db44322080315a5a9eb13bb67acd61be6e65862ec127366d742beca349c7ca8281e2f67193bafc14c8c0ee3f222b19b452d05c8491
-
Filesize
4.6MB
MD5397926927bca55be4a77839b1c44de6e
SHA1e10f3434ef3021c399dbba047832f02b3c898dbd
SHA2564f07e1095cc915b2d46eb149d1c3be14f3f4b4bd2742517265947fd23bdca5a7
SHA512cf54136b977fc8af7e8746d78676d0d464362a8cfa2213e392487003b5034562ee802e6911760b98a847bddd36ad664f32d849af84d7e208d4648bd97a2fa954