Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
10/05/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
FB23FDE22424F2B381E8325FB71CD2B6.exe
Resource
win7-20240221-en
General
-
Target
FB23FDE22424F2B381E8325FB71CD2B6.exe
-
Size
2.5MB
-
MD5
fb23fde22424f2b381e8325fb71cd2b6
-
SHA1
6628984dbfaf1e4ffc8a46861cad9809e0f53ebe
-
SHA256
b0e075912e279e893ea6f1aa33a3734679215d740b861ee1f607f1f0406b8094
-
SHA512
51dd1c34e0a58238a5ea69a58814ca88bbc299282ebae25d8e03014a0c5177daeb480115ff9b4112991fbecf64d3ac04af7fc0026d903dd761a7a8b3e4f25ed8
-
SSDEEP
49152:WRqr+/a5i+yQgWd2hvEdS82N26odkmgpAqGE0XjJ7lAXkE6:1+Uzyc2vEdSVJmgaqGE0XVKXk
Malware Config
Signatures
-
Detect ZGRat V1 34 IoCs
resource yara_rule behavioral2/memory/4500-3-0x000001D0A7120000-0x000001D0A733E000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-5-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-13-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-33-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-31-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-51-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-49-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-47-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-45-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-43-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-39-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-37-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-36-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-41-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-29-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-27-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-25-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-23-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-21-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-19-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-17-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-15-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-11-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-9-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-8-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-4-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-65-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-63-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-59-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-67-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-61-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-57-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-55-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 behavioral2/memory/4500-53-0x000001D0A7120000-0x000001D0A7338000-memory.dmp family_zgrat_v1 -
XMRig Miner payload 2 IoCs
resource yara_rule behavioral2/memory/3920-4922-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig behavioral2/memory/3920-4929-0x0000000140000000-0x00000001407DC000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3920-4922-0x0000000140000000-0x00000001407DC000-memory.dmp upx behavioral2/memory/3920-4929-0x0000000140000000-0x00000001407DC000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4018855536-2201274732-320770143-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\jotler = "C:\\Users\\Admin\\AppData\\Roaming\\jotler.exe" FB23FDE22424F2B381E8325FB71CD2B6.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4500 set thread context of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 3676 set thread context of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe Token: SeDebugPrivilege 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe Token: SeDebugPrivilege 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe Token: SeLockMemoryPrivilege 3920 ngen.exe Token: SeLockMemoryPrivilege 3920 ngen.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3920 ngen.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4500 wrote to memory of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 4500 wrote to memory of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 4500 wrote to memory of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 4500 wrote to memory of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 4500 wrote to memory of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 4500 wrote to memory of 3676 4500 FB23FDE22424F2B381E8325FB71CD2B6.exe 100 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101 PID 3676 wrote to memory of 3920 3676 FB23FDE22424F2B381E8325FB71CD2B6.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe -a rx/0 --url=65.109.127.181:3333 -u PLAYA -p PLAYA -R --variant=-1 --max-cpu-usage=70 --donate-level=1 -opencl3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3920
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aabcf0a58c791388481062e804b82e5d
SHA1322d0ac30e15cb80d799a416e5cb35db10e259ac
SHA25675cb2c51dac49b960ce0c25b495793a5b04500d44e49b42681f93d0114de5bb7
SHA51264220c514cd1fbf6c2a3eb981196b62ff4b7cdb12d6b1fab3ab815be56b47169997fb1dec1cac7055f73556e03c7f156b43c2e9793dfb674dc9f44a0e5bac7ab