Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/05/2024, 02:10

General

  • Target

    FB23FDE22424F2B381E8325FB71CD2B6.exe

  • Size

    2.5MB

  • MD5

    fb23fde22424f2b381e8325fb71cd2b6

  • SHA1

    6628984dbfaf1e4ffc8a46861cad9809e0f53ebe

  • SHA256

    b0e075912e279e893ea6f1aa33a3734679215d740b861ee1f607f1f0406b8094

  • SHA512

    51dd1c34e0a58238a5ea69a58814ca88bbc299282ebae25d8e03014a0c5177daeb480115ff9b4112991fbecf64d3ac04af7fc0026d903dd761a7a8b3e4f25ed8

  • SSDEEP

    49152:WRqr+/a5i+yQgWd2hvEdS82N26odkmgpAqGE0XjJ7lAXkE6:1+Uzyc2vEdSVJmgaqGE0XVKXk

Malware Config

Signatures

  • Detect ZGRat V1 34 IoCs
  • ZGRat

    ZGRat is remote access trojan written in C#.

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe
    "C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4500
    • C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe
      "C:\Users\Admin\AppData\Local\Temp\FB23FDE22424F2B381E8325FB71CD2B6.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3676
      • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
        C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe -a rx/0 --url=65.109.127.181:3333 -u PLAYA -p PLAYA -R --variant=-1 --max-cpu-usage=70 --donate-level=1 -opencl
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        PID:3920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\FB23FDE22424F2B381E8325FB71CD2B6.exe.log

    Filesize

    1KB

    MD5

    aabcf0a58c791388481062e804b82e5d

    SHA1

    322d0ac30e15cb80d799a416e5cb35db10e259ac

    SHA256

    75cb2c51dac49b960ce0c25b495793a5b04500d44e49b42681f93d0114de5bb7

    SHA512

    64220c514cd1fbf6c2a3eb981196b62ff4b7cdb12d6b1fab3ab815be56b47169997fb1dec1cac7055f73556e03c7f156b43c2e9793dfb674dc9f44a0e5bac7ab

  • memory/3676-4892-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/3676-4923-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3676-4913-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3676-4912-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp

    Filesize

    10.8MB

  • memory/3920-4929-0x0000000140000000-0x00000001407DC000-memory.dmp

    Filesize

    7.9MB

  • memory/3920-4922-0x0000000140000000-0x00000001407DC000-memory.dmp

    Filesize

    7.9MB

  • memory/4500-15-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-4-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-49-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-47-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-45-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-43-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-39-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-37-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-36-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-41-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-29-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-27-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-25-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-23-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-21-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-19-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-17-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-0-0x000001D08C7E0000-0x000001D08CA64000-memory.dmp

    Filesize

    2.5MB

  • memory/4500-11-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-9-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-8-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-51-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-65-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-63-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-59-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-67-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-61-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-57-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-55-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-53-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-4884-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4500-4886-0x000001D0A73A0000-0x000001D0A73EC000-memory.dmp

    Filesize

    304KB

  • memory/4500-4885-0x000001D0A7340000-0x000001D0A739A000-memory.dmp

    Filesize

    360KB

  • memory/4500-4887-0x000001D0A73F0000-0x000001D0A7444000-memory.dmp

    Filesize

    336KB

  • memory/4500-31-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-33-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-13-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-4911-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4500-5-0x000001D0A7120000-0x000001D0A7338000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-3-0x000001D0A7120000-0x000001D0A733E000-memory.dmp

    Filesize

    2.1MB

  • memory/4500-2-0x00007FFD5DB10000-0x00007FFD5E5D1000-memory.dmp

    Filesize

    10.8MB

  • memory/4500-1-0x00007FFD5DB13000-0x00007FFD5DB15000-memory.dmp

    Filesize

    8KB