Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
108s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
21/10/2022, 04:29
Static task
static1
Behavioral task
behavioral1
Sample
d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe
Resource
win7-20220901-en
General
-
Target
d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe
-
Size
89KB
-
MD5
55a2a638581ce1c259a850d264d28b84
-
SHA1
a9e7525e238a5f1e90055397252d81dd5e00f0d2
-
SHA256
d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c
-
SHA512
4c7056b5973c65c187b48733109b0936a68e03cb024f1e215c8497b9d0b6397215b5b42766270d1b1cbb1c399806908e0064b93f1ae329edb1455358e4e5f23d
-
SSDEEP
1536:rHIygkUcLXJ1jNkk7+K3BwSFCXte5tz4yC2ASelhEAiajhenUe:rHI0JXJ1NZn3Bw1Xte5WyC2AdhEAiaje
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/memory/1200-55-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral1/memory/1200-56-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral1/memory/1200-59-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral1/memory/1472-66-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral1/memory/1472-67-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat behavioral1/memory/1472-68-0x0000000000400000-0x000000000044A000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1472 fwrqwystkg -
Loads dropped DLL 1 IoCs
pid Process 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27 PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27 PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27 PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27 PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27 PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27 PID 1200 wrote to memory of 1472 1200 d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe"C:\Users\Admin\AppData\Local\Temp\d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1200 -
\??\c:\users\admin\appdata\local\fwrqwystkg"C:\Users\Admin\AppData\Local\Temp\d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe" a -sc:\users\admin\appdata\local\temp\d4e2368a849804a0c3e1c3478e53bf15618708489085a3dd988e4c51a8f2349c.exe2⤵
- Executes dropped EXE
PID:1472
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20.7MB
MD5510130c24764184d7e045741bb2295e4
SHA150265645e5b08c4ef7124db34d79f24595d0b72a
SHA2561271bfd14aa4af11c9cf7d8b0d0a7c559f96955675fc8422a4322b6bc1eed488
SHA5126bd1d655214223152c071a01d17484a602e1b5df73f440f5f743044178c23260bec93312d0cbb2067c93230b9d3ae550fd37b070c88d91d8d558100715eebcb4
-
Filesize
20.7MB
MD5510130c24764184d7e045741bb2295e4
SHA150265645e5b08c4ef7124db34d79f24595d0b72a
SHA2561271bfd14aa4af11c9cf7d8b0d0a7c559f96955675fc8422a4322b6bc1eed488
SHA5126bd1d655214223152c071a01d17484a602e1b5df73f440f5f743044178c23260bec93312d0cbb2067c93230b9d3ae550fd37b070c88d91d8d558100715eebcb4
-
Filesize
20.7MB
MD5510130c24764184d7e045741bb2295e4
SHA150265645e5b08c4ef7124db34d79f24595d0b72a
SHA2561271bfd14aa4af11c9cf7d8b0d0a7c559f96955675fc8422a4322b6bc1eed488
SHA5126bd1d655214223152c071a01d17484a602e1b5df73f440f5f743044178c23260bec93312d0cbb2067c93230b9d3ae550fd37b070c88d91d8d558100715eebcb4