Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/05/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
PI 09007.exe
Resource
win7-20240221-en
General
-
Target
PI 09007.exe
-
Size
1.2MB
-
MD5
488b62ebafa8cf690c5bbc6654b90371
-
SHA1
f823d4862173d5e9f8745a31bc6620839126e6bb
-
SHA256
d30a0a4160b520aa94e2aacbc0f016d1f31a3168130b5d83c0ed3356eff4439b
-
SHA512
20f05e5de74cfe36a6d7ffc6903ed29f25f29c606e90c1d8e98f0a3e0cdc2f4e78211591d89d07f32f90cbafc6644c14e4a3faad58d2417624841c2b31506806
-
SSDEEP
24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8a6EBlHDZKcW:ETvC/MTQYxsWR7a6EBlHDZKc
Malware Config
Signatures
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Detect ZGRat V1 33 IoCs
resource yara_rule behavioral2/memory/4396-33-0x0000000005630000-0x0000000005684000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-38-0x00000000059C0000-0x0000000005A12000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-53-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-51-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-97-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-95-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-93-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-89-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-87-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-85-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-84-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-81-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-79-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-77-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-75-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-73-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-71-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-69-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-65-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-63-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-61-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-59-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-57-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-55-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-49-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-47-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-45-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-43-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-99-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-91-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-67-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-41-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 behavioral2/memory/4396-40-0x00000000059C0000-0x0000000005A0D000-memory.dmp family_zgrat_v1 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 4396 2268 PI 09007.exe 97 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4396 RegSvcs.exe 4396 RegSvcs.exe 4396 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3588 PI 09007.exe 2268 PI 09007.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4396 RegSvcs.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3588 PI 09007.exe 3588 PI 09007.exe 3588 PI 09007.exe 2268 PI 09007.exe 2268 PI 09007.exe 2268 PI 09007.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 3588 PI 09007.exe 3588 PI 09007.exe 3588 PI 09007.exe 2268 PI 09007.exe 2268 PI 09007.exe 2268 PI 09007.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1212 3588 PI 09007.exe 95 PID 3588 wrote to memory of 1212 3588 PI 09007.exe 95 PID 3588 wrote to memory of 1212 3588 PI 09007.exe 95 PID 3588 wrote to memory of 2268 3588 PI 09007.exe 96 PID 3588 wrote to memory of 2268 3588 PI 09007.exe 96 PID 3588 wrote to memory of 2268 3588 PI 09007.exe 96 PID 2268 wrote to memory of 4396 2268 PI 09007.exe 97 PID 2268 wrote to memory of 4396 2268 PI 09007.exe 97 PID 2268 wrote to memory of 4396 2268 PI 09007.exe 97 PID 2268 wrote to memory of 4396 2268 PI 09007.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"2⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:548
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
262KB
MD55f3af2273e242e1c9e41da8da9e620e7
SHA1988d95dfa28a4ceec57b0011d4a8514554b5fcc1
SHA256c41aca818739b0ddeb57afd092dca6277ad03df2adaeb714f072865bed5b1b26
SHA512e632c5bdf505118f770944d201da47b289c7e53517c395d66e2f5b2d717be8a7d67bdd760af1735e6ad1dce03225bfbc0b2e3c7073eb8b7bc77c4db5c1df262a
-
Filesize
29KB
MD532e645d0a3a593441900412075bfc1a5
SHA103f23b6c559860efe88169fcfb234b71d0d15641
SHA256122851ece836072678a6c6a650b1ee8c3dd38d988ee202e3bf634d9dd56d20c3
SHA512b0c919a4b551b6bbfc65a85f7c2ea2104953eda849b504f942c5d57874e053b715a05ed9c64d1ae5a73d06d56a0b02645fe3398c894ff2e50425b34e473fc9f0