Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 13:16
Behavioral task
behavioral1
Sample
e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe
Resource
win7-20220812-en
General
-
Target
e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe
-
Size
39KB
-
MD5
3697872eb74777ad7075dd6cd529edc0
-
SHA1
217f4af3aea4ad2ee02c1bb53e3223f9f18506c1
-
SHA256
e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648
-
SHA512
01d3984dbaa07a5528c2e61b65a0b01292bd9106d319d67a02326dd0487be2924bb0c3e7b0d886b58aac1e0056db14836aabd4cd80acf8b2e3fa3623187960eb
-
SSDEEP
768:JKqq1uaVze+uFNSlcUkFR1Df0ermMUXIisUaAsJ/APII:JKqauaVzebGcD/f+9X/WAh
Malware Config
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral2/memory/5084-132-0x0000000000400000-0x000000000041A000-memory.dmp family_gh0strat behavioral2/files/0x000b000000022e67-133.dat family_gh0strat behavioral2/files/0x000a000000022e74-134.dat family_gh0strat behavioral2/files/0x000a000000022e74-135.dat family_gh0strat behavioral2/files/0x000b000000022e67-137.dat family_gh0strat -
resource yara_rule behavioral2/memory/5084-132-0x0000000000400000-0x000000000041A000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe 3748 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Iefg\Nefghijkl.pic e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe File opened for modification C:\Program Files (x86)\Iefg\Nefghijkl.pic e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe 3748 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeRestorePrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeBackupPrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeRestorePrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeBackupPrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeRestorePrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeBackupPrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe Token: SeRestorePrivilege 5084 e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe"C:\Users\Admin\AppData\Local\Temp\e3d9f812f239413941941086ed157ef80735d70f76873fc1e8141f2ac5e3f648.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:5084
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:3748
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
69KB
MD547e638ba159126d58216f99e640b8ea1
SHA146816e8734562a5fd7a9aecbec9661f92a624fbe
SHA2565c16257ee22ccb24890b7330e3d2de3e412ad2968e0c70280a22f338e7c0daac
SHA51207f84228958e2f396f864fcc1c7772087d74e29286f9c327340e53cf459350ed0d9e5b6e1c4ea0eff0cf40bf302b00f1f2e8bc3da286a0e4f674ec84292f44c9
-
Filesize
69KB
MD547e638ba159126d58216f99e640b8ea1
SHA146816e8734562a5fd7a9aecbec9661f92a624fbe
SHA2565c16257ee22ccb24890b7330e3d2de3e412ad2968e0c70280a22f338e7c0daac
SHA51207f84228958e2f396f864fcc1c7772087d74e29286f9c327340e53cf459350ed0d9e5b6e1c4ea0eff0cf40bf302b00f1f2e8bc3da286a0e4f674ec84292f44c9
-
Filesize
5.4MB
MD59f3da639b7930a9b92c87e28ee824907
SHA19a97bd904ae0cbe5074238d83f029bcbd6f29ddd
SHA25656ba2c4e071fb4341cb81876f3ce1e10fe7ec9398186d0a51289188d8827c102
SHA5128aeadcac8bd63f4794befeb3ec837d9fe7a5e2d5a4360ae698dae1168468ef3335da80a355cc733b47133bfcbe628991807abeb1c9ffd517da60fdbfb8295a85
-
Filesize
116B
MD5f21ad185a473ad6ea751d12dd8f95bd1
SHA136140cb443c822deb94f1d00b7b2bbcaa33fab58
SHA2568affd040a29140d2785315c13c2b42b4b05adf185f459d84cad25c68efb2248b
SHA512459b717026a924da07fbec75b2576481e9f5d951024c617c52ece80e65fad735b3f125b65690c4589cdf7b7ed49057a1873f3a96cceef69bcd2e3468e2be885b
-
Filesize
5.4MB
MD59f3da639b7930a9b92c87e28ee824907
SHA19a97bd904ae0cbe5074238d83f029bcbd6f29ddd
SHA25656ba2c4e071fb4341cb81876f3ce1e10fe7ec9398186d0a51289188d8827c102
SHA5128aeadcac8bd63f4794befeb3ec837d9fe7a5e2d5a4360ae698dae1168468ef3335da80a355cc733b47133bfcbe628991807abeb1c9ffd517da60fdbfb8295a85