Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2022, 18:14

General

  • Target

    6ac1a3bdd906172a774fa64d06248d5a394daa53660249b867501af2a4d9e916.exe

  • Size

    162KB

  • MD5

    6540da98c6bf8f8faa145222d5cc3870

  • SHA1

    135d89f6bd483af7ebe5f404c07ddbed539305df

  • SHA256

    6ac1a3bdd906172a774fa64d06248d5a394daa53660249b867501af2a4d9e916

  • SHA512

    84d3922116206182ead4dfc1aee3db736c83423a4ebf447750ff085044c8d4592530fddc97bf910a56324b161d742ce19bbc4649188b27660351c123e726148e

  • SSDEEP

    3072:6584GfIcKMq0FvNc4g441eja0doSji58hChiLotV:6mfI9MbFvNc4XkSjdot

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 16 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Sets file execution options in registry 2 TTPs 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 1 IoCs
  • Modifies data under HKEY_USERS 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ac1a3bdd906172a774fa64d06248d5a394daa53660249b867501af2a4d9e916.exe
    "C:\Users\Admin\AppData\Local\Temp\6ac1a3bdd906172a774fa64d06248d5a394daa53660249b867501af2a4d9e916.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4656
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\6ac1a3bdd906172a774fa64d06248d5a394daa53660249b867501af2a4d9e916.exe"
      2⤵
        PID:4296
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "rihjkdf3kjkdf3"
      1⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe c:\windows\system32\mte567f76m.dll, slexp
        2⤵
        • Blocklisted process makes network request
        • Sets file execution options in registry
        • Loads dropped DLL
        • Modifies data under HKEY_USERS
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "DefaultSetting" -y
          3⤵
          • Executes dropped EXE
          PID:1204
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "DefaultSetting" -o
          3⤵
          • Executes dropped EXE
          PID:1860
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow14" -x -f 0=64.62.151.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:2768
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow1" -x -f 0=1.255.48.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:1076
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow2" -x -f 0=115.68.64.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:2744
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow3" -x -f 0=117.52.156.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:1960
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow4" -x -f 0=175.158.2.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:1856
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow5" -x -f 0=211.115.106.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:4088
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow6" -x -f 0=211.233.80.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:552
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow7" -x -f 0=182.162.157.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:4824
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow8" -x -f 0=60.12.232.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:2580
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow9" -x -f 0=182.162.156.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:3112
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow10" -x -f 0=61.135.185.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:932
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow11" -x -f 0=61.135.185.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:4720
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow12" -x -f 0=61.135.185.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:1404
        • C:\Windows\TEMP\240585609.dat
          C:\Windows\TEMP\\240585609.dat -w REG -p "xDefaultSettingx" -r "allow13" -x -f 0=61.135.185.* -n BLOCK
          3⤵
          • Executes dropped EXE
          PID:4232

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\SysWOW64\mte567f76m.dll

      Filesize

      143KB

      MD5

      0109e42f8b062ef94c3948851a547a3a

      SHA1

      1deaa38d30195a0463c28c173cce8840f8930a42

      SHA256

      90e1b6f0278e231db64a81550f576ac3bc47ad9fcfbc1b5878b178d953fb1457

      SHA512

      dd94c1d82734cfda501a269573a6cbac0dbcd230a5846b00cf23b9ab88706bd4cece9e30dbc2f041d6944a980894216f266eb6c2c3673ef0c4eb5604edfcbd2f

    • C:\Windows\SysWOW64\mte567f76m.dll

      Filesize

      143KB

      MD5

      0109e42f8b062ef94c3948851a547a3a

      SHA1

      1deaa38d30195a0463c28c173cce8840f8930a42

      SHA256

      90e1b6f0278e231db64a81550f576ac3bc47ad9fcfbc1b5878b178d953fb1457

      SHA512

      dd94c1d82734cfda501a269573a6cbac0dbcd230a5846b00cf23b9ab88706bd4cece9e30dbc2f041d6944a980894216f266eb6c2c3673ef0c4eb5604edfcbd2f

    • C:\Windows\SysWOW64\mte567f76m.dll

      Filesize

      143KB

      MD5

      0109e42f8b062ef94c3948851a547a3a

      SHA1

      1deaa38d30195a0463c28c173cce8840f8930a42

      SHA256

      90e1b6f0278e231db64a81550f576ac3bc47ad9fcfbc1b5878b178d953fb1457

      SHA512

      dd94c1d82734cfda501a269573a6cbac0dbcd230a5846b00cf23b9ab88706bd4cece9e30dbc2f041d6944a980894216f266eb6c2c3673ef0c4eb5604edfcbd2f

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • C:\Windows\Temp\240585609.dat

      Filesize

      36KB

      MD5

      7d1c58aa3491fbc241da8935aba04f5d

      SHA1

      651e46e9904c74c7a65cc51b169c1e6c3c9e4662

      SHA256

      6063464075da5cea6d27bcd9d12235e87784467a270f66160ee17c3f2b858b0c

      SHA512

      f10850caabbc9ff1bb373c80b644ae49714edc3c6e806dcd30415df50aad5e7ba7a44214c0a80e9f8743f1b9e6e0066c16bcb534d8b4fdd572145c4f9fa2d488

    • \??\c:\windows\SysWOW64\mte567f76m.dll

      Filesize

      143KB

      MD5

      0109e42f8b062ef94c3948851a547a3a

      SHA1

      1deaa38d30195a0463c28c173cce8840f8930a42

      SHA256

      90e1b6f0278e231db64a81550f576ac3bc47ad9fcfbc1b5878b178d953fb1457

      SHA512

      dd94c1d82734cfda501a269573a6cbac0dbcd230a5846b00cf23b9ab88706bd4cece9e30dbc2f041d6944a980894216f266eb6c2c3673ef0c4eb5604edfcbd2f