Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
1zhongaclie...75.zip
windows7-x64
4zhongaclie...75.zip
windows10-2004-x64
1zhongaclie...und.js
windows7-x64
3zhongaclie...und.js
windows10-2004-x64
3zhongaclie...i.html
windows7-x64
3zhongaclie...i.html
windows10-2004-x64
3zhongaclie...x.html
windows7-x64
3zhongaclie...x.html
windows10-2004-x64
3zhongaclie...ain.js
windows7-x64
3zhongaclie...ain.js
windows10-2004-x64
3zhongaclie...mid.js
windows7-x64
3zhongaclie...mid.js
windows10-2004-x64
3zhongaclie...itm.js
windows7-x64
3zhongaclie...itm.js
windows10-2004-x64
3zhongaclie...min.js
windows7-x64
3zhongaclie...min.js
windows10-2004-x64
3zhongaclie...min.js
windows7-x64
3zhongaclie...min.js
windows10-2004-x64
3zhongaclie...min.js
windows7-x64
3zhongaclie...min.js
windows10-2004-x64
3zhongaclie...der.js
windows7-x64
3zhongaclie...der.js
windows10-2004-x64
3zhongaclie..._t.png
windows7-x64
1zhongaclie..._t.png
windows10-2004-x64
3zhongaclie...n1.css
windows7-x64
3zhongaclie...n1.css
windows10-2004-x64
7zhongaclie...t.json
windows7-x64
3zhongaclie...t.json
windows10-2004-x64
3zhongaclie...p.html
windows7-x64
3zhongaclie...p.html
windows10-2004-x64
3zhongaclie...pup.js
windows7-x64
3zhongaclie...pup.js
windows10-2004-x64
3Analysis
-
max time kernel
119s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/07/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
zhongaclient by zhong 0.0.7 p75.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
zhongaclient by zhong 0.0.7 p75.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
zhongaclient by zhong 0.0.7 p75/background.js
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
zhongaclient by zhong 0.0.7 p75/background.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
zhongaclient by zhong 0.0.7 p75/gui.html
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
zhongaclient by zhong 0.0.7 p75/gui.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
zhongaclient by zhong 0.0.7 p75/index.html
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
zhongaclient by zhong 0.0.7 p75/index.html
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
zhongaclient by zhong 0.0.7 p75/inject/main.js
Resource
win7-20240705-en
Behavioral task
behavioral10
Sample
zhongaclient by zhong 0.0.7 p75/inject/main.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
zhongaclient by zhong 0.0.7 p75/inject/mid.js
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
zhongaclient by zhong 0.0.7 p75/inject/mid.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral13
Sample
zhongaclient by zhong 0.0.7 p75/inject/ws_mitm.js
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
zhongaclient by zhong 0.0.7 p75/inject/ws_mitm.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
zhongaclient by zhong 0.0.7 p75/libs/jquery.min.js
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
zhongaclient by zhong 0.0.7 p75/libs/jquery.min.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
zhongaclient by zhong 0.0.7 p75/libs/pathfinding-browser.min.js
Resource
win7-20240705-en
Behavioral task
behavioral18
Sample
zhongaclient by zhong 0.0.7 p75/libs/pathfinding-browser.min.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral19
Sample
zhongaclient by zhong 0.0.7 p75/libs/socket.io.min.js
Resource
win7-20240704-en
Behavioral task
behavioral20
Sample
zhongaclient by zhong 0.0.7 p75/libs/socket.io.min.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
zhongaclient by zhong 0.0.7 p75/loader.js
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
zhongaclient by zhong 0.0.7 p75/loader.js
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
zhongaclient by zhong 0.0.7 p75/logo_t.png
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
zhongaclient by zhong 0.0.7 p75/logo_t.png
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
zhongaclient by zhong 0.0.7 p75/main1.css
Resource
win7-20240704-en
Behavioral task
behavioral26
Sample
zhongaclient by zhong 0.0.7 p75/main1.css
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
zhongaclient by zhong 0.0.7 p75/manifest.json
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
zhongaclient by zhong 0.0.7 p75/manifest.json
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
zhongaclient by zhong 0.0.7 p75/popup.html
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
zhongaclient by zhong 0.0.7 p75/popup.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
zhongaclient by zhong 0.0.7 p75/popup.js
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
zhongaclient by zhong 0.0.7 p75/popup.js
Resource
win10v2004-20240709-en
General
-
Target
zhongaclient by zhong 0.0.7 p75.zip
-
Size
368KB
-
MD5
0a4f29f19879fd63a98f125d33f60284
-
SHA1
1bc147acd3ad050585f90e039aa88b98f1f83fde
-
SHA256
dffb606169831b2baea5de7c081ea21f11dfd70224ba90e3f39d4734981b02c6
-
SHA512
9deba320868369c752a89a0ef81ce79a27c8b3ec3da327572ec725bdaa235cc62c0c382448ce65d9738ee78030c027d453c76ea26386d9f7ad7a9190dda2dc62
-
SSDEEP
6144:++noRyVSfcmb9wlmpWv09Opc2fKVFlPTu+wN0mETwCLxl4A24pHIhyc2:+CgLal+61p9ClyN7KCKHIQR
Malware Config
Signatures
-
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2816 WINWORD.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2816 WINWORD.EXE 2816 WINWORD.EXE
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,"C:\Users\Admin\AppData\Local\Temp\zhongaclient by zhong 0.0.7 p75.zip"1⤵PID:2028
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\Desktop\StartSend.docx"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2816
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD523c9510a014f642b29039a1cd00b5ff5
SHA1981169169efa182b7ccad2136826bbceb0d3dee7
SHA256f0eb2f0c33a390f8edef3b56a8861f97e8ad142cba43650d946a1774872fdcfa
SHA512eb7c748238effac3b0d6a7a197ebfce3a02a646bd2c75581d2422ac21d9b6300fb5d8bc78a6b2fbb7cc429a1a7bd8c9a42e1687d5bb352cc27ff73c883a85c9b
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84