Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    159s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/05/2024, 01:35

General

  • Target

    PI 09007.exe

  • Size

    1.2MB

  • MD5

    488b62ebafa8cf690c5bbc6654b90371

  • SHA1

    f823d4862173d5e9f8745a31bc6620839126e6bb

  • SHA256

    d30a0a4160b520aa94e2aacbc0f016d1f31a3168130b5d83c0ed3356eff4439b

  • SHA512

    20f05e5de74cfe36a6d7ffc6903ed29f25f29c606e90c1d8e98f0a3e0cdc2f4e78211591d89d07f32f90cbafc6644c14e4a3faad58d2417624841c2b31506806

  • SSDEEP

    24576:EqDEvCTbMWu7rQYlBQcBiT6rprG8a6EBlHDZKcW:ETvC/MTQYxsWR7a6EBlHDZKc

Malware Config

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • Detect ZGRat V1 33 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PI 09007.exe
    "C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"
      2⤵
        PID:1212
      • C:\Users\Admin\AppData\Local\Temp\PI 09007.exe
        "C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2268
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\PI 09007.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4396
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3972 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:548

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\aut946B.tmp

        Filesize

        262KB

        MD5

        5f3af2273e242e1c9e41da8da9e620e7

        SHA1

        988d95dfa28a4ceec57b0011d4a8514554b5fcc1

        SHA256

        c41aca818739b0ddeb57afd092dca6277ad03df2adaeb714f072865bed5b1b26

        SHA512

        e632c5bdf505118f770944d201da47b289c7e53517c395d66e2f5b2d717be8a7d67bdd760af1735e6ad1dce03225bfbc0b2e3c7073eb8b7bc77c4db5c1df262a

      • C:\Users\Admin\AppData\Local\Temp\semispinalis

        Filesize

        29KB

        MD5

        32e645d0a3a593441900412075bfc1a5

        SHA1

        03f23b6c559860efe88169fcfb234b71d0d15641

        SHA256

        122851ece836072678a6c6a650b1ee8c3dd38d988ee202e3bf634d9dd56d20c3

        SHA512

        b0c919a4b551b6bbfc65a85f7c2ea2104953eda849b504f942c5d57874e053b715a05ed9c64d1ae5a73d06d56a0b02645fe3398c894ff2e50425b34e473fc9f0

      • memory/3588-12-0x0000000003310000-0x0000000003314000-memory.dmp

        Filesize

        16KB

      • memory/4396-26-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/4396-27-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/4396-28-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/4396-29-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/4396-30-0x000000007421E000-0x000000007421F000-memory.dmp

        Filesize

        4KB

      • memory/4396-31-0x0000000000400000-0x0000000000446000-memory.dmp

        Filesize

        280KB

      • memory/4396-32-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-33-0x0000000005630000-0x0000000005684000-memory.dmp

        Filesize

        336KB

      • memory/4396-34-0x000000007421E000-0x000000007421F000-memory.dmp

        Filesize

        4KB

      • memory/4396-35-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-36-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-37-0x0000000005CF0000-0x0000000006294000-memory.dmp

        Filesize

        5.6MB

      • memory/4396-38-0x00000000059C0000-0x0000000005A12000-memory.dmp

        Filesize

        328KB

      • memory/4396-39-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-53-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-51-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-97-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-95-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-93-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-89-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-87-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-85-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-84-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-81-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-79-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-77-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-75-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-73-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-71-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-69-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-65-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-63-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-61-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-59-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-57-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-55-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-49-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-47-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-45-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-43-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-99-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-1070-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-91-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-67-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-41-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-40-0x00000000059C0000-0x0000000005A0D000-memory.dmp

        Filesize

        308KB

      • memory/4396-1071-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-1072-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB

      • memory/4396-1073-0x0000000001400000-0x0000000001466000-memory.dmp

        Filesize

        408KB

      • memory/4396-1074-0x0000000074210000-0x00000000749C0000-memory.dmp

        Filesize

        7.7MB