Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2022, 15:20
Behavioral task
behavioral1
Sample
392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe
Resource
win10v2004-20221111-en
General
-
Target
392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe
-
Size
179KB
-
MD5
11875740398942ee2cc75d1f7805c1c1
-
SHA1
5bd449ee9f2b31fcd523ab868dc8fbd236d003c8
-
SHA256
392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626
-
SHA512
7b27ba48d8104df63cf0b49df820ea88b24f2c54c59a8777f379ec449b676b61e347b52fce0f0f50b3d4629eabecb8675e98f5807ba4380a962b6bb44f072d55
-
SSDEEP
3072:ESJUC/BLNNB7jGVMc7AlhKhAMIN9Z8scPCgJtt:ESJNNNrG58hm09JcCgB
Malware Config
Signatures
-
Gh0st RAT payload 13 IoCs
resource yara_rule behavioral2/files/0x0008000000022df1-133.dat family_gh0strat behavioral2/files/0x0008000000022df1-134.dat family_gh0strat behavioral2/memory/1936-135-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/memory/224-136-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/files/0x0007000000022dfa-137.dat family_gh0strat behavioral2/files/0x0007000000022dfa-138.dat family_gh0strat behavioral2/files/0x0008000000022df1-140.dat family_gh0strat behavioral2/memory/224-141-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/memory/1936-142-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/memory/2916-143-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/memory/3720-144-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/memory/2916-145-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat behavioral2/memory/3720-146-0x0000000000400000-0x000000000042E000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 224 Sogou.exe 2916 Sougou.exe 3720 Sogou.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" Sougou.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\progra~1\\Common Files\\Sogou.exe" 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run Sougou.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sougou.exe Sogou.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\progra~1\Common Files\Sogou.exe 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe File opened for modification C:\progra~1\Common Files\Sogou.exe 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe File created C:\progra~1\Common Files\Sogou.exe Sougou.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3800 3720 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1936 wrote to memory of 224 1936 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe 82 PID 1936 wrote to memory of 224 1936 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe 82 PID 1936 wrote to memory of 224 1936 392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe 82 PID 2916 wrote to memory of 3720 2916 Sougou.exe 84 PID 2916 wrote to memory of 3720 2916 Sougou.exe 84 PID 2916 wrote to memory of 3720 2916 Sougou.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe"C:\Users\Admin\AppData\Local\Temp\392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:224
-
-
C:\Windows\SysWOW64\Sougou.exeC:\Windows\SysWOW64\Sougou.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\progra~1\Common Files\Sogou.exe"C:\progra~1\Common Files\Sogou.exe"2⤵
- Executes dropped EXE
PID:3720 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3720 -s 6843⤵
- Program crash
PID:3800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3720 -ip 37201⤵PID:4020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
179KB
MD511875740398942ee2cc75d1f7805c1c1
SHA15bd449ee9f2b31fcd523ab868dc8fbd236d003c8
SHA256392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626
SHA5127b27ba48d8104df63cf0b49df820ea88b24f2c54c59a8777f379ec449b676b61e347b52fce0f0f50b3d4629eabecb8675e98f5807ba4380a962b6bb44f072d55
-
Filesize
179KB
MD511875740398942ee2cc75d1f7805c1c1
SHA15bd449ee9f2b31fcd523ab868dc8fbd236d003c8
SHA256392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626
SHA5127b27ba48d8104df63cf0b49df820ea88b24f2c54c59a8777f379ec449b676b61e347b52fce0f0f50b3d4629eabecb8675e98f5807ba4380a962b6bb44f072d55
-
Filesize
27.2MB
MD54aafef6466759a45cee69b857152f4f6
SHA100805afb06e0bd0b106bf04c006c3dc447345663
SHA2562266ec07e2bd7b5562cc505ec47addf40ae0b0a8cf83118353da21a81bfabfff
SHA512338432b80ea793acc08e9de32e7c6ac4557922f5e53b01f4a64b862ad1f1e7c532396c55f3ee8904da11fc65c8a08175b50eba73b6fe534f470d56bf17b8db4b
-
Filesize
27.2MB
MD54aafef6466759a45cee69b857152f4f6
SHA100805afb06e0bd0b106bf04c006c3dc447345663
SHA2562266ec07e2bd7b5562cc505ec47addf40ae0b0a8cf83118353da21a81bfabfff
SHA512338432b80ea793acc08e9de32e7c6ac4557922f5e53b01f4a64b862ad1f1e7c532396c55f3ee8904da11fc65c8a08175b50eba73b6fe534f470d56bf17b8db4b
-
Filesize
179KB
MD511875740398942ee2cc75d1f7805c1c1
SHA15bd449ee9f2b31fcd523ab868dc8fbd236d003c8
SHA256392a8f23af3997bb13e6d84df2b93c34e20712803a7da01b9a093844cc293626
SHA5127b27ba48d8104df63cf0b49df820ea88b24f2c54c59a8777f379ec449b676b61e347b52fce0f0f50b3d4629eabecb8675e98f5807ba4380a962b6bb44f072d55