Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21/01/2022, 23:13
Static task
static1
Behavioral task
behavioral1
Sample
khushi pics all/khushi.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
khushi pics all/khushi.exe
Resource
win10-en-20211208
General
-
Target
khushi pics all/khushi.exe
-
Size
985KB
-
MD5
3cb7f596cbaa622e8b505335722ab558
-
SHA1
617df380f49c4017315f503c5947c88d80b4ab21
-
SHA256
1fdb5dd192e813f337adc21dfe4a31e1de10bd2bbb5b58ca51a6836b7e108953
-
SHA512
b3879f19e65ec0de247c6f835405e94362697fed09669edca22ba491e1c1cd7a5e82487c26324e43db00f9c4593f32efdd81549061cb46ae9d6df61b9d6ec9a6
Malware Config
Signatures
-
CrimsonRAT Main Payload 2 IoCs
resource yara_rule behavioral1/files/0x000600000001265d-58.dat family_crimsonrat behavioral1/files/0x000600000001265d-57.dat family_crimsonrat -
CrimsonRat
Crimson RAT is a malware linked to a Pakistani-linked threat actor.
-
Executes dropped EXE 1 IoCs
pid Process 676 widthacan.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\PROGRA~3\Btharmis\widthacan.exe khushi.exe File opened for modification C:\PROGRA~3\Btharmis\widthacan.exe khushi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1660 wrote to memory of 676 1660 khushi.exe 27 PID 1660 wrote to memory of 676 1660 khushi.exe 27 PID 1660 wrote to memory of 676 1660 khushi.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\khushi pics all\khushi.exe"C:\Users\Admin\AppData\Local\Temp\khushi pics all\khushi.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\ProgramData\Btharmis\widthacan.exe"C:\ProgramData\Btharmis\widthacan.exe"2⤵
- Executes dropped EXE
PID:676
-