Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    07/11/2022, 15:56

General

  • Target

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523.exe

  • Size

    168KB

  • MD5

    0da30e92f7dd8cc6ad3c35f77a0caa80

  • SHA1

    64a6be72141295cdd8ecacf0f4513328e45bab58

  • SHA256

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523

  • SHA512

    0ce91ffd1ae6fd9a2472b177388c85798ccfe8e5483e99ab862b84d51d4ce41f6d40e2b3d88e6d33cec4e8aea1280ead2b71be7e042f42ae6dd288e03bade8d1

  • SSDEEP

    3072:a55WhN9npi8X7+0rbaemqKKgrkF0tIjnK0LHB8BwXc4+4uFXBfOJ4lQHwmj3yadX:a55WzZX7+0rb1mq+lIj3LHmBwXcxfXFY

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523.exe
    "C:\Users\Admin\AppData\Local\Temp\d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523.exe"
    1⤵
    • Drops file in System32 directory
    PID:1416
  • C:\Windows\SysWOW64\zgtdcg.exe
    C:\Windows\SysWOW64\zgtdcg.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\Windows\TEMP\hrl873B.tmp
      C:\Windows\TEMP\hrl873B.tmp
      2⤵
      • Executes dropped EXE
      PID:1524

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\zgtdcg.exe

    Filesize

    168KB

    MD5

    0da30e92f7dd8cc6ad3c35f77a0caa80

    SHA1

    64a6be72141295cdd8ecacf0f4513328e45bab58

    SHA256

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523

    SHA512

    0ce91ffd1ae6fd9a2472b177388c85798ccfe8e5483e99ab862b84d51d4ce41f6d40e2b3d88e6d33cec4e8aea1280ead2b71be7e042f42ae6dd288e03bade8d1

  • C:\Windows\SysWOW64\zgtdcg.exe

    Filesize

    168KB

    MD5

    0da30e92f7dd8cc6ad3c35f77a0caa80

    SHA1

    64a6be72141295cdd8ecacf0f4513328e45bab58

    SHA256

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523

    SHA512

    0ce91ffd1ae6fd9a2472b177388c85798ccfe8e5483e99ab862b84d51d4ce41f6d40e2b3d88e6d33cec4e8aea1280ead2b71be7e042f42ae6dd288e03bade8d1

  • C:\Windows\Temp\hrl873B.tmp

    Filesize

    168KB

    MD5

    0da30e92f7dd8cc6ad3c35f77a0caa80

    SHA1

    64a6be72141295cdd8ecacf0f4513328e45bab58

    SHA256

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523

    SHA512

    0ce91ffd1ae6fd9a2472b177388c85798ccfe8e5483e99ab862b84d51d4ce41f6d40e2b3d88e6d33cec4e8aea1280ead2b71be7e042f42ae6dd288e03bade8d1

  • \Windows\SysWOW64\hra33.dll

    Filesize

    176KB

    MD5

    e8f8cc390926e678ccefef14d1232840

    SHA1

    5b735f61905a152ffa92fa90f1ab55f4a83b3197

    SHA256

    90947d4b74ddb340bc3ee0d2f3f43392be493f668e68439c997a7bd8af04f174

    SHA512

    40766823bcbfd0d17cf067cc58cc84b21cc184f7c4ac08b349ca2ffa216d5009e7e22fa8db5d29ea2e9ea8bc6b610d887b5baef261988c824c233aaa3860b951

  • \Windows\Temp\hrl873B.tmp

    Filesize

    168KB

    MD5

    0da30e92f7dd8cc6ad3c35f77a0caa80

    SHA1

    64a6be72141295cdd8ecacf0f4513328e45bab58

    SHA256

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523

    SHA512

    0ce91ffd1ae6fd9a2472b177388c85798ccfe8e5483e99ab862b84d51d4ce41f6d40e2b3d88e6d33cec4e8aea1280ead2b71be7e042f42ae6dd288e03bade8d1

  • \Windows\Temp\hrl873B.tmp

    Filesize

    168KB

    MD5

    0da30e92f7dd8cc6ad3c35f77a0caa80

    SHA1

    64a6be72141295cdd8ecacf0f4513328e45bab58

    SHA256

    d47a641a7ba541f1431a68a6bbcb7b0246efd1adbb0ba3341fce2ce713d70523

    SHA512

    0ce91ffd1ae6fd9a2472b177388c85798ccfe8e5483e99ab862b84d51d4ce41f6d40e2b3d88e6d33cec4e8aea1280ead2b71be7e042f42ae6dd288e03bade8d1

  • memory/1416-54-0x0000000075E81000-0x0000000075E83000-memory.dmp

    Filesize

    8KB