Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    187s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/11/2022, 04:07

General

  • Target

    f839434adf175d2a555e2adf1c46c5d34a444e35d78b9ec2008e7d82e4976013.exe

  • Size

    73KB

  • MD5

    22c41b7f6097a2ebd7d98b51ed8eb476

  • SHA1

    696651a10bb922e4ff3cda08879a9789e79f2fb1

  • SHA256

    f839434adf175d2a555e2adf1c46c5d34a444e35d78b9ec2008e7d82e4976013

  • SHA512

    05ceca6abd4928f0dfdb189dcc33df171afb248bfa02be4299862608ea9b279c38c70bdec68a2c5ea593c3a66c4bb443e7198a7313ce1cfe8bfcefde289ecadb

  • SSDEEP

    1536:pZm8hEnrtUqKpriZVLnocQ67frP8Q18sQn7jt7D:28hEnRUZrMLnoT6LrP828sQn7jt7D

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Blocklisted process makes network request 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f839434adf175d2a555e2adf1c46c5d34a444e35d78b9ec2008e7d82e4976013.exe
    "C:\Users\Admin\AppData\Local\Temp\f839434adf175d2a555e2adf1c46c5d34a444e35d78b9ec2008e7d82e4976013.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    PID:5064
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3816
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe c:\windows\system32\aircmd.dll, kongqiwin7 .Net CLR
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      PID:4760

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\AirCmd.dll

    Filesize

    65KB

    MD5

    2609e8dae402d982e7a6f0664416e48b

    SHA1

    49c4315ab9fdcea15338a51e0b3f91b13f6a3cc8

    SHA256

    f226782d43c11cd708d9132e2bba9aff51889d719f771f71dc028cb1193dadbb

    SHA512

    1d45f92b26fe89ad8288dc60e018c0551c2d3ce4f225ddd8ccb6064e5c12ca0674c64382daa3b4aa8af84147dd47acb6e0fe358ff578c4a80cc8adeb9a306422

  • C:\Windows\SysWOW64\AirCmd.dll

    Filesize

    65KB

    MD5

    2609e8dae402d982e7a6f0664416e48b

    SHA1

    49c4315ab9fdcea15338a51e0b3f91b13f6a3cc8

    SHA256

    f226782d43c11cd708d9132e2bba9aff51889d719f771f71dc028cb1193dadbb

    SHA512

    1d45f92b26fe89ad8288dc60e018c0551c2d3ce4f225ddd8ccb6064e5c12ca0674c64382daa3b4aa8af84147dd47acb6e0fe358ff578c4a80cc8adeb9a306422

  • \??\c:\windows\SysWOW64\aircmd.dll

    Filesize

    65KB

    MD5

    2609e8dae402d982e7a6f0664416e48b

    SHA1

    49c4315ab9fdcea15338a51e0b3f91b13f6a3cc8

    SHA256

    f226782d43c11cd708d9132e2bba9aff51889d719f771f71dc028cb1193dadbb

    SHA512

    1d45f92b26fe89ad8288dc60e018c0551c2d3ce4f225ddd8ccb6064e5c12ca0674c64382daa3b4aa8af84147dd47acb6e0fe358ff578c4a80cc8adeb9a306422