Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    47s
  • max time network
    52s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 01:55

General

  • Target

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08.exe

  • Size

    83KB

  • MD5

    05c6cb96e97f3ee0b93ae3652bcb8fff

  • SHA1

    8a58bef69e11ec7943289ccf58e320f10a76162c

  • SHA256

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08

  • SHA512

    5873da7d6b248d827b8b0602e36809a803ca4205f378fbfa03574000a1674eee1d8c2b6770526b699d7ef02abd033393e693f5f515e22328f4dc1f47356d55f4

  • SSDEEP

    1536:56xsm+IVWw9Yu6JEfjYeJvn08XfF9ulpXudVnH2OPc+q:ExsfOPBdn007e8dNWQc+

Malware Config

Signatures

  • Gh0st RAT payload 4 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 11 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08.exe
    "C:\Users\Admin\AppData\Local\Temp\8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\progra~1\Common Files\Sogou.exe
      "C:\progra~1\Common Files\Sogou.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      PID:824
  • C:\Windows\SysWOW64\Sougou.exe
    C:\Windows\SysWOW64\Sougou.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:544
    • C:\progra~1\Common Files\Sogou.exe
      "C:\progra~1\Common Files\Sogou.exe"
      2⤵
      • Executes dropped EXE
      PID:700

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PROGRA~1\Common Files\Sogou.exe

    Filesize

    83KB

    MD5

    05c6cb96e97f3ee0b93ae3652bcb8fff

    SHA1

    8a58bef69e11ec7943289ccf58e320f10a76162c

    SHA256

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08

    SHA512

    5873da7d6b248d827b8b0602e36809a803ca4205f378fbfa03574000a1674eee1d8c2b6770526b699d7ef02abd033393e693f5f515e22328f4dc1f47356d55f4

  • C:\PROGRA~1\Common Files\Sogou.exe

    Filesize

    83KB

    MD5

    05c6cb96e97f3ee0b93ae3652bcb8fff

    SHA1

    8a58bef69e11ec7943289ccf58e320f10a76162c

    SHA256

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08

    SHA512

    5873da7d6b248d827b8b0602e36809a803ca4205f378fbfa03574000a1674eee1d8c2b6770526b699d7ef02abd033393e693f5f515e22328f4dc1f47356d55f4

  • C:\Windows\SysWOW64\Sougou.exe

    Filesize

    27.1MB

    MD5

    6a2ea4775c7ad239cfcc779c13882028

    SHA1

    e24a5252846c8335d467cfec426cf60a4e67e1ce

    SHA256

    557fb7a363e7aa12be5d0d398e3967f04bb701c2cbd9e30d4ccc1fdca6c9160a

    SHA512

    02ac0684bebdfd17c4ae0805781542a08c917cf3b9c5f53f6b5287ec618b1d47ad0591281517edb5ef24032a1e7a4754a85cbec1493b35dc3f9ee552ce1caf93

  • C:\Windows\SysWOW64\Sougou.exe

    Filesize

    27.1MB

    MD5

    6a2ea4775c7ad239cfcc779c13882028

    SHA1

    e24a5252846c8335d467cfec426cf60a4e67e1ce

    SHA256

    557fb7a363e7aa12be5d0d398e3967f04bb701c2cbd9e30d4ccc1fdca6c9160a

    SHA512

    02ac0684bebdfd17c4ae0805781542a08c917cf3b9c5f53f6b5287ec618b1d47ad0591281517edb5ef24032a1e7a4754a85cbec1493b35dc3f9ee552ce1caf93

  • C:\progra~1\Common Files\Sogou.exe

    Filesize

    83KB

    MD5

    05c6cb96e97f3ee0b93ae3652bcb8fff

    SHA1

    8a58bef69e11ec7943289ccf58e320f10a76162c

    SHA256

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08

    SHA512

    5873da7d6b248d827b8b0602e36809a803ca4205f378fbfa03574000a1674eee1d8c2b6770526b699d7ef02abd033393e693f5f515e22328f4dc1f47356d55f4

  • \PROGRA~1\Common Files\Sogou.exe

    Filesize

    83KB

    MD5

    05c6cb96e97f3ee0b93ae3652bcb8fff

    SHA1

    8a58bef69e11ec7943289ccf58e320f10a76162c

    SHA256

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08

    SHA512

    5873da7d6b248d827b8b0602e36809a803ca4205f378fbfa03574000a1674eee1d8c2b6770526b699d7ef02abd033393e693f5f515e22328f4dc1f47356d55f4

  • \PROGRA~1\Common Files\Sogou.exe

    Filesize

    83KB

    MD5

    05c6cb96e97f3ee0b93ae3652bcb8fff

    SHA1

    8a58bef69e11ec7943289ccf58e320f10a76162c

    SHA256

    8e19a5742b7ba12a3a9c2ddd9a07eb4f77323c3713a59eb9fb72bd71f6412f08

    SHA512

    5873da7d6b248d827b8b0602e36809a803ca4205f378fbfa03574000a1674eee1d8c2b6770526b699d7ef02abd033393e693f5f515e22328f4dc1f47356d55f4

  • memory/544-70-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/544-72-0x0000000000240000-0x0000000000274000-memory.dmp

    Filesize

    208KB

  • memory/700-71-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/824-67-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1380-54-0x00000000757A1000-0x00000000757A3000-memory.dmp

    Filesize

    8KB

  • memory/1380-64-0x0000000000400000-0x0000000000434000-memory.dmp

    Filesize

    208KB

  • memory/1380-66-0x0000000000240000-0x0000000000274000-memory.dmp

    Filesize

    208KB