Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05/02/2025, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe
Resource
win7-20240903-en
General
-
Target
b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe
-
Size
1.2MB
-
MD5
e07f60f17877835bbb17988791d7ce0b
-
SHA1
f66a444933ee913449c3e6bb1b3574d6f431fce6
-
SHA256
b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee
-
SHA512
8a4fb23fb78d26703cfb719ebe7d556633b054ffe9fb327f60d7c0c8083afa2d2216460659c7cc23d5372d8611974344a46bc50b88bb3aa54b987f9d134b69f1
-
SSDEEP
24576:LaJd9N11Fk1VM+q2fv3BrUIQxgcEQXwBNtr+:WzkPMYv3Br6ZDStC
Malware Config
Signatures
-
Detect ZGRat V2 1 IoCs
resource yara_rule behavioral1/memory/1668-5-0x0000000004A00000-0x0000000004AE0000-memory.dmp family_zgrat_v2 -
Zgrat family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2628 1668 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2628 1668 b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe 31 PID 1668 wrote to memory of 2628 1668 b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe 31 PID 1668 wrote to memory of 2628 1668 b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe 31 PID 1668 wrote to memory of 2628 1668 b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe"C:\Users\Admin\AppData\Local\Temp\b37366aca9ab7a613177c8f3d645d82118eecbe400d740a9cb6607c0988ca2ee.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 8522⤵
- Program crash
PID:2628
-