Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    160s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/10/2022, 15:03

General

  • Target

    2109900b6f99855f8f2d4f4e7e51c3776d485783ae5028d36b11a6012d449f39.exe

  • Size

    122KB

  • MD5

    65efd7e8316afc1bac6fd3235f323f80

  • SHA1

    17205cca1a391e7d32292a1525a802b1d538ee1d

  • SHA256

    2109900b6f99855f8f2d4f4e7e51c3776d485783ae5028d36b11a6012d449f39

  • SHA512

    b944189ae6c4413e3d1f5b57f99a29e4088ec85be25af8d96f8f2acb71cc8e8896b6c3261576741b9835a3686d750b0faa09ebd2817cbf998566c44123f1e642

  • SSDEEP

    3072:eWd2nNoFUPaKD1avrb8fZNwQAOfXKEby95uK1grgO:LraQvrb2ZNW0XKEby9n4

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2109900b6f99855f8f2d4f4e7e51c3776d485783ae5028d36b11a6012d449f39.exe
    "C:\Users\Admin\AppData\Local\Temp\2109900b6f99855f8f2d4f4e7e51c3776d485783ae5028d36b11a6012d449f39.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2128
  • C:\Windows\cugcue.exe
    C:\Windows\cugcue.exe
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: GetForegroundWindowSpam
    PID:4748

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\cugcue.exe

    Filesize

    122KB

    MD5

    65efd7e8316afc1bac6fd3235f323f80

    SHA1

    17205cca1a391e7d32292a1525a802b1d538ee1d

    SHA256

    2109900b6f99855f8f2d4f4e7e51c3776d485783ae5028d36b11a6012d449f39

    SHA512

    b944189ae6c4413e3d1f5b57f99a29e4088ec85be25af8d96f8f2acb71cc8e8896b6c3261576741b9835a3686d750b0faa09ebd2817cbf998566c44123f1e642

  • C:\Windows\cugcue.exe

    Filesize

    122KB

    MD5

    65efd7e8316afc1bac6fd3235f323f80

    SHA1

    17205cca1a391e7d32292a1525a802b1d538ee1d

    SHA256

    2109900b6f99855f8f2d4f4e7e51c3776d485783ae5028d36b11a6012d449f39

    SHA512

    b944189ae6c4413e3d1f5b57f99a29e4088ec85be25af8d96f8f2acb71cc8e8896b6c3261576741b9835a3686d750b0faa09ebd2817cbf998566c44123f1e642

  • memory/2128-132-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2128-134-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2128-135-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/2128-142-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/4748-138-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/4748-141-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/4748-140-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB

  • memory/4748-143-0x0000000010000000-0x0000000010038000-memory.dmp

    Filesize

    224KB