Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2022, 03:43
Behavioral task
behavioral1
Sample
7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe
Resource
win7-20220812-en
General
-
Target
7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe
-
Size
44KB
-
MD5
618fc20e56f213f87ff1137234db50b1
-
SHA1
be7dd3cdc936665fe8ef32f3f586ea6c73c6dd5b
-
SHA256
7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d
-
SHA512
cb7612ed8a5a647258dc9227cc98a5249b66276f14cabad89890d11cc4e7da18f82f38d2928b85f68d8690efc94ffbd45c53a50ff786fc137c05ba5bdc0435a7
-
SSDEEP
768:rKG5Nu8rcnjOaGoKRkCBBpHaI0u5oguVKHZnK0LwRn4RiHVXoaV:HNu8r0/GrvES0Rnd1YaV
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000d000000022e17-132.dat family_gh0strat behavioral2/files/0x000d000000022e17-133.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1120 Ugccmuy.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Ugccmuy.exe 7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe File opened for modification C:\Windows\Ugccmuy.exe 7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 812 7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe 812 7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe"C:\Users\Admin\AppData\Local\Temp\7baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:812
-
C:\Windows\Ugccmuy.exeC:\Windows\Ugccmuy.exe1⤵
- Executes dropped EXE
PID:1120
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5618fc20e56f213f87ff1137234db50b1
SHA1be7dd3cdc936665fe8ef32f3f586ea6c73c6dd5b
SHA2567baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d
SHA512cb7612ed8a5a647258dc9227cc98a5249b66276f14cabad89890d11cc4e7da18f82f38d2928b85f68d8690efc94ffbd45c53a50ff786fc137c05ba5bdc0435a7
-
Filesize
44KB
MD5618fc20e56f213f87ff1137234db50b1
SHA1be7dd3cdc936665fe8ef32f3f586ea6c73c6dd5b
SHA2567baa274733b73e804f9e59ca08b954d7ed6f812779304bffdcf72906a1d8166d
SHA512cb7612ed8a5a647258dc9227cc98a5249b66276f14cabad89890d11cc4e7da18f82f38d2928b85f68d8690efc94ffbd45c53a50ff786fc137c05ba5bdc0435a7