Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
120s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/05/2024, 01:51
Static task
static1
Behavioral task
behavioral1
Sample
a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe
Resource
win7-20240221-en
General
-
Target
a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe
-
Size
6.1MB
-
MD5
5186cafa1e8ce4e242411acc52996aaa
-
SHA1
c14b7773f62bb601e4f910ae595cbc8d1f641c32
-
SHA256
a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a
-
SHA512
a351d17942033364fe8e8e48673c25a1b7988c83432961e35a036d54ab08c9a3b095b5784de9d7442e31f42e41401aaec79b3facd96fcd9a9fa93afd283eb42b
-
SSDEEP
196608:ZwHfJ12mWXFSrOyruZ1e1l+Sc6Z2Fd6GymVVdq:QIFSrOwk0m3a9hMA
Malware Config
Signatures
-
Detect ZGRat V1 6 IoCs
resource yara_rule behavioral1/files/0x002c0000000155d4-8.dat family_zgrat_v1 behavioral1/files/0x0009000000015a2d-21.dat family_zgrat_v1 behavioral1/memory/2408-25-0x0000000000060000-0x00000000003CA000-memory.dmp family_zgrat_v1 behavioral1/files/0x0006000000016e56-69.dat family_zgrat_v1 behavioral1/memory/1036-82-0x0000000000090000-0x00000000003FA000-memory.dmp family_zgrat_v1 behavioral1/files/0x0009000000015c3c-80.dat family_zgrat_v1 -
Detects executables packed with unregistered version of .NET Reactor 6 IoCs
resource yara_rule behavioral1/files/0x002c0000000155d4-8.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/files/0x0009000000015a2d-21.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/2408-25-0x0000000000060000-0x00000000003CA000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/files/0x0006000000016e56-69.dat INDICATOR_EXE_Packed_DotNetReactor behavioral1/memory/1036-82-0x0000000000090000-0x00000000003FA000-memory.dmp INDICATOR_EXE_Packed_DotNetReactor behavioral1/files/0x0009000000015c3c-80.dat INDICATOR_EXE_Packed_DotNetReactor -
Disables Task Manager via registry modification
-
Executes dropped EXE 3 IoCs
pid Process 2264 MoonHack cfg helper.exe 2408 BridgeChainportWebInto.exe 1036 System.exe -
Loads dropped DLL 2 IoCs
pid Process 564 cmd.exe 564 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files\Windows Journal\WmiPrvSE.exe BridgeChainportWebInto.exe File created C:\Program Files\Windows Journal\24dbde2999530e BridgeChainportWebInto.exe File created C:\Program Files\VideoLAN\VLC\lua\System.exe BridgeChainportWebInto.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\System.exe BridgeChainportWebInto.exe File created C:\Program Files\VideoLAN\VLC\lua\27d1bcfc3c54e0 BridgeChainportWebInto.exe File created C:\Program Files\Microsoft Office\Office14\WmiPrvSE.exe BridgeChainportWebInto.exe File created C:\Program Files\Microsoft Office\Office14\24dbde2999530e BridgeChainportWebInto.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\886983d96e3d3e BridgeChainportWebInto.exe File created C:\Windows\Downloaded Program Files\csrss.exe BridgeChainportWebInto.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 636 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe 2408 BridgeChainportWebInto.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2408 BridgeChainportWebInto.exe Token: SeDebugPrivilege 1036 System.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1284 wrote to memory of 2264 1284 a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe 28 PID 1284 wrote to memory of 2264 1284 a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe 28 PID 1284 wrote to memory of 2264 1284 a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe 28 PID 1284 wrote to memory of 2264 1284 a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe 28 PID 2264 wrote to memory of 2676 2264 MoonHack cfg helper.exe 29 PID 2264 wrote to memory of 2676 2264 MoonHack cfg helper.exe 29 PID 2264 wrote to memory of 2676 2264 MoonHack cfg helper.exe 29 PID 2264 wrote to memory of 2676 2264 MoonHack cfg helper.exe 29 PID 2676 wrote to memory of 564 2676 WScript.exe 32 PID 2676 wrote to memory of 564 2676 WScript.exe 32 PID 2676 wrote to memory of 564 2676 WScript.exe 32 PID 2676 wrote to memory of 564 2676 WScript.exe 32 PID 564 wrote to memory of 636 564 cmd.exe 34 PID 564 wrote to memory of 636 564 cmd.exe 34 PID 564 wrote to memory of 636 564 cmd.exe 34 PID 564 wrote to memory of 636 564 cmd.exe 34 PID 564 wrote to memory of 2408 564 cmd.exe 35 PID 564 wrote to memory of 2408 564 cmd.exe 35 PID 564 wrote to memory of 2408 564 cmd.exe 35 PID 564 wrote to memory of 2408 564 cmd.exe 35 PID 2408 wrote to memory of 2412 2408 BridgeChainportWebInto.exe 36 PID 2408 wrote to memory of 2412 2408 BridgeChainportWebInto.exe 36 PID 2408 wrote to memory of 2412 2408 BridgeChainportWebInto.exe 36 PID 2412 wrote to memory of 2700 2412 cmd.exe 38 PID 2412 wrote to memory of 2700 2412 cmd.exe 38 PID 2412 wrote to memory of 2700 2412 cmd.exe 38 PID 2412 wrote to memory of 2744 2412 cmd.exe 39 PID 2412 wrote to memory of 2744 2412 cmd.exe 39 PID 2412 wrote to memory of 2744 2412 cmd.exe 39 PID 2412 wrote to memory of 1036 2412 cmd.exe 40 PID 2412 wrote to memory of 1036 2412 cmd.exe 40 PID 2412 wrote to memory of 1036 2412 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe"C:\Users\Admin\AppData\Local\Temp\a10d2a23354cf0130e15d2bf55148e7c34131033b62500615a60bb6f13f0c53a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\MoonHack cfg helper.exe"C:\Users\Admin\AppData\Local\Temp\MoonHack cfg helper.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\componentRuntimehost\qJhC.vbe"3⤵
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\componentRuntimehost\ZSAMlm727VnRbcACh79Hay0D7R9lrDKrBu.bat" "4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f5⤵
- Modifies registry key
PID:636
-
-
C:\Users\Admin\AppData\Roaming\componentRuntimehost\BridgeChainportWebInto.exe"C:\Users\Admin\AppData\Roaming\componentRuntimehost/BridgeChainportWebInto.exe"5⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6ONt7i6u8S.bat"6⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:2700
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:27⤵PID:2744
-
-
C:\Program Files\VideoLAN\VLC\lua\System.exe"C:\Program Files\VideoLAN\VLC\lua\System.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD54daa6418e407f8357916b02dc665c5a0
SHA111a70eb3a617bb14398ea0998d43aa336082232f
SHA256505a811646b2dceaf90092c38b1ff0dd71745c1a876d8d3feba49276307800a6
SHA512b50ec4b06f0b4a1ca07431d50bcaf73c0aff9423271a4f96fba3f1802c49beec0ef94c936d9e183c6f199ca57f579f25fe23081f37e3cd8288163245fde914ab
-
Filesize
220B
MD537e29bb5e3b92806134e6e877e893519
SHA18e4bcfb072f952e7c8f770ad4fc176918d825ae0
SHA2560459bcf60cbc01cb8b09693faccd2944ff2f2297d4213d3df20267d126c0d205
SHA5121e9bc39c69fe8855d7338890b83c09b72dfc573dd72594e2a5365c707270fbc477b3fd8151242c03b45abb9555c6dab5b08be81c8ded21b4acfdf014f9c2d0f8
-
Filesize
2.1MB
MD57909ebef4dcca4c12310ea3acd8f53f7
SHA1d5e5c0210bd384378f24e9f9209124d4af6d3da7
SHA2568eabb7d40887e02b4aa9933fdca0d5ee1d46a5a26a69a4da9279b6819742121a
SHA512ec85375ea50bfa391120f6e8402bf8bfe34afefebfec8616dad3a76becbd73e1eca8bbaed1fb010de76d0e8f0ba34641ad4cb8f8a7a234050a13fca5bf1131cb
-
Filesize
212B
MD5f4846b111f4c8ced35bf1ed60502270f
SHA1625bb8296688ca9cde0c60c60cc17ed83383050c
SHA2562b20a48f281b60176569332a9e56f5aa7911ba9793f87f9729aafc81aab5a6cd
SHA512ef77a850b15f988754eb17c48ce84e15bcf824c4bcc64ac7f5f372f86fee5738de67417fd0cf56271d1701b5256edcf4ad8603b5fab28016af8e28359967df67
-
Filesize
240B
MD5cf441f15daf3339180706cf594e97131
SHA1ca5663745d79bd9196fea24b51d6061f79355d3c
SHA2569a2afde59f2326a4cfbc827e87c7270da20d4a6e19e8d00b5b3a479c26f8ad13
SHA51237d2b08ca78ee06fbcc93577a31a243670fd4efce506449e2e4e3b33c2319081e1f905f8651a642112386620f6551c1a598cdc7f69e682ee252fddc2fa9cde74
-
Filesize
2.8MB
MD56dc9114e994d3772fdb05caa7a1a41ab
SHA11cad245e2a1382953284a34ec7a4d58aa33a5b83
SHA2560fe07459060e3fb8c153c76536eae3d7b7f4cfb62389225517411b0e5263940e
SHA5124c3b38f18e9602afeb6aa42cdedbf40e01ad3da45e4e9637544e442576091e1a8b7c0a3059e302676f8f32fe6f46b1e4c4f97dd69fbd78822b8dc153f040049b
-
Filesize
3.4MB
MD551a33d556ce031ad0a5e752f10b00a13
SHA1f05e11e3034481de8590ee4afd912628cacfde9a
SHA256eab0d35dc956885b222e69fde419f3974db712c98bbb23f41325388bde0cc341
SHA512c27a18ebee3e32854e4ad136c3af7de753764a9b44fc024487eb4a197a3f68b506f8578c4beab63e23c64b4e8ce10d63d2987b78175a9691e9aec9fc13887356