Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
189s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe
Resource
win10v2004-20221111-en
General
-
Target
6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe
-
Size
183KB
-
MD5
0e9ab48caf7bf7f3729f2f91c1803317
-
SHA1
78a80a1a117f9d7862ba4e0f84cdfc0ed73a498f
-
SHA256
6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795
-
SHA512
e2f24667296b82d90ba03a7adbb2d6fe1fd654d607082a22660a6a09a32938359ad353cb4bea4508552c97f4fe2b2c8a5dcd41cdf623af41dbda480f1ccf95a1
-
SSDEEP
3072:rMqKbTtCSIT0chwzzcdZKF8UvvoeWofjjpAVioRF8s//NLj6h+EvtRu:49MMmwzlqUHoeWofjjpAViY/lH6h+Evu
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/976-134-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/976-135-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/976-138-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX255362BB = "C:\\Windows\\XXXXXX255362BB\\svchsot.exe" 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\XXXXXX255362BB\JH.BAT 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5048 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 976 wrote to memory of 4412 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 82 PID 976 wrote to memory of 4412 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 82 PID 976 wrote to memory of 4412 976 6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe 82 PID 4412 wrote to memory of 1656 4412 cmd.exe 84 PID 4412 wrote to memory of 1656 4412 cmd.exe 84 PID 4412 wrote to memory of 1656 4412 cmd.exe 84 PID 4412 wrote to memory of 5048 4412 cmd.exe 85 PID 4412 wrote to memory of 5048 4412 cmd.exe 85 PID 4412 wrote to memory of 5048 4412 cmd.exe 85 PID 4412 wrote to memory of 2520 4412 cmd.exe 86 PID 4412 wrote to memory of 2520 4412 cmd.exe 86 PID 4412 wrote to memory of 2520 4412 cmd.exe 86 PID 2520 wrote to memory of 4328 2520 net.exe 87 PID 2520 wrote to memory of 4328 2520 net.exe 87 PID 2520 wrote to memory of 4328 2520 net.exe 87 PID 4412 wrote to memory of 2064 4412 cmd.exe 88 PID 4412 wrote to memory of 2064 4412 cmd.exe 88 PID 4412 wrote to memory of 2064 4412 cmd.exe 88 PID 4412 wrote to memory of 3636 4412 cmd.exe 89 PID 4412 wrote to memory of 3636 4412 cmd.exe 89 PID 4412 wrote to memory of 3636 4412 cmd.exe 89 PID 4412 wrote to memory of 3596 4412 cmd.exe 90 PID 4412 wrote to memory of 3596 4412 cmd.exe 90 PID 4412 wrote to memory of 3596 4412 cmd.exe 90 PID 4412 wrote to memory of 4592 4412 cmd.exe 91 PID 4412 wrote to memory of 4592 4412 cmd.exe 91 PID 4412 wrote to memory of 4592 4412 cmd.exe 91 PID 4412 wrote to memory of 4544 4412 cmd.exe 92 PID 4412 wrote to memory of 4544 4412 cmd.exe 92 PID 4412 wrote to memory of 4544 4412 cmd.exe 92 PID 4412 wrote to memory of 2772 4412 cmd.exe 93 PID 4412 wrote to memory of 2772 4412 cmd.exe 93 PID 4412 wrote to memory of 2772 4412 cmd.exe 93 PID 4412 wrote to memory of 5072 4412 cmd.exe 94 PID 4412 wrote to memory of 5072 4412 cmd.exe 94 PID 4412 wrote to memory of 5072 4412 cmd.exe 94 PID 4412 wrote to memory of 4408 4412 cmd.exe 95 PID 4412 wrote to memory of 4408 4412 cmd.exe 95 PID 4412 wrote to memory of 4408 4412 cmd.exe 95 PID 4412 wrote to memory of 3520 4412 cmd.exe 96 PID 4412 wrote to memory of 3520 4412 cmd.exe 96 PID 4412 wrote to memory of 3520 4412 cmd.exe 96 PID 4412 wrote to memory of 2704 4412 cmd.exe 97 PID 4412 wrote to memory of 2704 4412 cmd.exe 97 PID 4412 wrote to memory of 2704 4412 cmd.exe 97 PID 4412 wrote to memory of 1936 4412 cmd.exe 98 PID 4412 wrote to memory of 1936 4412 cmd.exe 98 PID 4412 wrote to memory of 1936 4412 cmd.exe 98 PID 4412 wrote to memory of 3164 4412 cmd.exe 99 PID 4412 wrote to memory of 3164 4412 cmd.exe 99 PID 4412 wrote to memory of 3164 4412 cmd.exe 99 PID 4412 wrote to memory of 3984 4412 cmd.exe 100 PID 4412 wrote to memory of 3984 4412 cmd.exe 100 PID 4412 wrote to memory of 3984 4412 cmd.exe 100 PID 4412 wrote to memory of 4940 4412 cmd.exe 101 PID 4412 wrote to memory of 4940 4412 cmd.exe 101 PID 4412 wrote to memory of 4940 4412 cmd.exe 101 PID 4412 wrote to memory of 4852 4412 cmd.exe 102 PID 4412 wrote to memory of 4852 4412 cmd.exe 102 PID 4412 wrote to memory of 4852 4412 cmd.exe 102 PID 4412 wrote to memory of 3496 4412 cmd.exe 103 PID 4412 wrote to memory of 3496 4412 cmd.exe 103 PID 4412 wrote to memory of 3496 4412 cmd.exe 103 PID 4412 wrote to memory of 1480 4412 cmd.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe"C:\Users\Admin\AppData\Local\Temp\6bdb1cc96bca039874ff0d3a2ff3a8bd02a46e9fc55a38ba930d70792dfed795.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\XXXXXX255362BB\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:1656
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:5048
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:4328
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:2064
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3636
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3596
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4592
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4544
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:2772
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:5072
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4408
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3520
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:2704
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:1936
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3164
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3984
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4940
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4852
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3496
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:1480
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3060
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:2264
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:3192
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:2544
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4232
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:1076
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:924
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXX255362BB\svchsot.exe3⤵PID:4168
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a459956fdedb90926695046bd26b58ac
SHA121e682ff1f95712d727b05fc941732e308e5413e
SHA256126874685fccca502cc02eca6b77c62938f3049664ceb0efc57311c98ec9fe53
SHA5125cfd5faa1ef154e1bdc501cc8fa2356d3c3f66664a8287f2af31402c7dc2107584a38efa8388e9f97a06e516f1892454578f0d07c91be29f372a2edfc8a35147