Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    129s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/05/2024, 01:04

General

  • Target

    81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe

  • Size

    1.8MB

  • MD5

    15b75648ad8160565cfd4008ae223ce0

  • SHA1

    2800a25191362b57c9762c74fc668960f11937bc

  • SHA256

    81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d

  • SHA512

    25eb48fd2ea9a2781b6ed82ebc00b6d4df2ddbe57dee366dd39f67f8dcf9c02cf675c9578b11057d07ae0c6d8cc65371971f51df8eac27cc36e0e27d42bc9b0b

  • SSDEEP

    24576:pRr3fEcKSoIu4cMlay9GvZsk8ynlK01Pi5LO1K4Bb/8GeAyb1L5ZXMUJcapQKS3L:TAUpQ8yU26a1KU8ZAyb15ea61pFWcig

Malware Config

Signatures

  • Detect ZGRat V1 3 IoCs
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 15 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 12 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe
    "C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2524
    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ttandca5\ttandca5.cmdline"
      2⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2484
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES254C.tmp" "c:\Windows\System32\CSCF9773BFC7D43436CB859ECCBC734785.TMP"
        3⤵
          PID:2512
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\KMlxGx7yLZ.bat"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\system32\chcp.com
          chcp 65001
          3⤵
            PID:572
          • C:\Windows\system32\PING.EXE
            ping -n 10 localhost
            3⤵
            • Runs ping.exe
            PID:2768
          • C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe
            "C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe"
            3⤵
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2844
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 6 /tr "'C:\Users\Default\Links\winlogon.exe'" /f
        1⤵
        • Creates scheduled task(s)
        PID:2760
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Users\Default\Links\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Creates scheduled task(s)
        PID:2604
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 14 /tr "'C:\Users\Default\Links\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Creates scheduled task(s)
        PID:2464
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\Performance\winlogon.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2148
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\Performance\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1848
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "winlogonw" /sc MINUTE /mo 13 /tr "'C:\Windows\Performance\winlogon.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2736
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 5 /tr "'C:\Recovery\77984722-d108-11ee-bdd4-c695cbc44580\Idle.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2732
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Recovery\77984722-d108-11ee-bdd4-c695cbc44580\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 14 /tr "'C:\Recovery\77984722-d108-11ee-bdd4-c695cbc44580\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1580
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2928
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1608
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 5 /tr "'C:\Windows\Registration\CRMLog\csrss.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1764
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2316
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2328
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "IdleI" /sc MINUTE /mo 6 /tr "'C:\Program Files (x86)\Common Files\DESIGNER\Idle.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1616
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d8" /sc MINUTE /mo 10 /tr "'C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe'" /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:824
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d" /sc ONLOGON /tr "'C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:2872
      • C:\Windows\system32\schtasks.exe
        schtasks.exe /create /tn "81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d8" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\AppData\Local\Temp\81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d.exe'" /rl HIGHEST /f
        1⤵
        • Process spawned unexpected child process
        • Creates scheduled task(s)
        PID:1440

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\KMlxGx7yLZ.bat

        Filesize

        230B

        MD5

        e38589b8619ce2383bd759f06c17942b

        SHA1

        95777477534cd747b3eab9e91d719ee3b4a1f8da

        SHA256

        5ea75ba6800a6c2fe3c587fb4e57df2db02fda58be1b8520feb0c82485dae4a8

        SHA512

        e4a8e3907d6b205540310614e964687f626a391f931d3bce38b2e821d8b48387d2c8e390c21c97e18d185d5d19fff81806d8b887c902f14979160c2d3958dce8

      • C:\Users\Admin\AppData\Local\Temp\RES254C.tmp

        Filesize

        1KB

        MD5

        ccff527c2b4ee92c5625f8752bbb774e

        SHA1

        470e7a91742bb03ed4afa3c3fbfe3eb8d45489e1

        SHA256

        9a577a7e25a6329ec58ff382a44978b83fbfa0ca284943ed573596c44ded8001

        SHA512

        807bbfe35e5a21dba7d7db20414ed4c42db7ee127aa0ec8e9ce8f427863e66dd76db53f43f993747b97e69c4930f8a0ec0be8d65841bc26fffd9a12b52905b3f

      • C:\Users\Default\Links\winlogon.exe

        Filesize

        1.8MB

        MD5

        15b75648ad8160565cfd4008ae223ce0

        SHA1

        2800a25191362b57c9762c74fc668960f11937bc

        SHA256

        81e18d35c83b04e7ee6288294cdfc7ef57af3c44d44788a21577e808b3a99a9d

        SHA512

        25eb48fd2ea9a2781b6ed82ebc00b6d4df2ddbe57dee366dd39f67f8dcf9c02cf675c9578b11057d07ae0c6d8cc65371971f51df8eac27cc36e0e27d42bc9b0b

      • \??\c:\Users\Admin\AppData\Local\Temp\ttandca5\ttandca5.0.cs

        Filesize

        367B

        MD5

        3f67fe2e028f9a8cce9304eb44c228a3

        SHA1

        a89c4eeda6fa3a7fd0953b1d070eb2017629f6f3

        SHA256

        e68b02ee7ded3756b97eac30356f718246facd165c1ab42c119cb88de3a3b7c8

        SHA512

        8d037e7b014dcd708c25dfaec6b8edce3523ff9173686f07a90d550192c89f16180e1289d5d24b6662b5bc2b696d678f6f4392967fe76815be44915d559ff953

      • \??\c:\Users\Admin\AppData\Local\Temp\ttandca5\ttandca5.cmdline

        Filesize

        235B

        MD5

        4dc34b8aa291de790f6e1de45e28881f

        SHA1

        2664fdeda39238c871b5ae4977cb783e3515400d

        SHA256

        3f45e36245bb8b6a19c9a383dd86ea86317855774ff7b688f7453b541f1b6be5

        SHA512

        f081ff0b12753f55f8c6b6c7f5f8ea5aab1a31c980c107b41843e0900b328a094178eac366cdbb47bb6a8ea4d1f158762ffcbe8dce7f99d96f594ae5ec6fa6b0

      • \??\c:\Windows\System32\CSCF9773BFC7D43436CB859ECCBC734785.TMP

        Filesize

        1KB

        MD5

        3ffa0b85adc175bc535d5b61b093b6a5

        SHA1

        7fa7715f9f18aa1d9edc45935ca867602fa37894

        SHA256

        f05ea17245f2e54aa3b2a0a8ede3f86af5fb4e4f0cf0a6aa69c4e95103304d46

        SHA512

        d1034200ad1232d7e36d3d867e701357c9eb8e8ad063743deceb563b24eb099e6ea660e38099cf161c12c97fe11cf6b044a31846949d63d4a121f1692c9e6fde

      • memory/2524-28-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-2-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-4-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-8-0x0000000000330000-0x000000000034C000-memory.dmp

        Filesize

        112KB

      • memory/2524-0-0x000007FEF5CE3000-0x000007FEF5CE4000-memory.dmp

        Filesize

        4KB

      • memory/2524-3-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-26-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-27-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-46-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-14-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-1-0x0000000000880000-0x0000000000A5A000-memory.dmp

        Filesize

        1.9MB

      • memory/2524-13-0x0000000000310000-0x000000000031C000-memory.dmp

        Filesize

        48KB

      • memory/2524-11-0x0000000000460000-0x0000000000478000-memory.dmp

        Filesize

        96KB

      • memory/2524-9-0x000007FEF5CE0000-0x000007FEF66CC000-memory.dmp

        Filesize

        9.9MB

      • memory/2524-6-0x0000000000300000-0x000000000030E000-memory.dmp

        Filesize

        56KB

      • memory/2844-47-0x0000000001100000-0x00000000012DA000-memory.dmp

        Filesize

        1.9MB