Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
34s -
max time network
41s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/12/2022, 20:57
Behavioral task
behavioral1
Sample
a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe
Resource
win10v2004-20221111-en
General
-
Target
a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe
-
Size
783KB
-
MD5
735f0f706afd0913eff44095eea10e31
-
SHA1
5ef1b959ccaf5364663d1056b87fe1ebf85fea51
-
SHA256
a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d
-
SHA512
32c930576362d68b46b4ab2a5392f63183425b49a8145217eebc19fae70dbbe30d7c1f07abc74b02ed97b8af928de3f299c8fecad12300420aa62e09372345a5
-
SSDEEP
12288:jfoZQG1PyUwGh3Q9xRQpR3PvGLxe0DMwRoZQp1PyUwGhxYV:Tod1twGwkR3PIx7DBoe1twGC
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1612-55-0x0000000000400000-0x00000000004C8000-memory.dmp family_gh0strat behavioral1/memory/1612-62-0x0000000000400000-0x00000000004C8000-memory.dmp family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Vrckwr\Parameters\ServiceDll = "C:\\Windows\\system32\\Vrckwrex.dll" regedit.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Vrckwrex.dll a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe File created C:\Windows\SysWOW64\syslog.dat a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe File opened for modification C:\Windows\SysWOW64\Vrckwrex.dll_lang.ini a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe File created C:\Windows\SysWOW64\dllcache\Vrckwrex.dll a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe File created C:\Windows\SysWOW64\Vrckwrex.dll a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs .reg file with regedit 3 IoCs
pid Process 2020 regedit.exe 1704 regedit.exe 1528 regedit.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 85899345940 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe Token: SeDebugPrivilege 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 2020 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 26 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1704 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 27 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28 PID 1612 wrote to memory of 1528 1612 a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe"C:\Users\Admin\AppData\Local\Temp\a46fc273226d0ef8cc8cd79ff08bd7cf5bb43f5d584cc42c197f0cb49bbca17d.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /e "C:\Users\Admin\AppData\Local\Temp\7119246_lang.reg" "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Svchost"2⤵
- Runs .reg file with regedit
PID:2020
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\7119246_lang.reg"2⤵
- Runs .reg file with regedit
PID:1704
-
-
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s "C:\Users\Admin\AppData\Local\Temp\7131960_lang.reg"2⤵
- Sets DLL path for service in the registry
- Runs .reg file with regedit
PID:1528
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵PID:1256
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD54586eade6d621cf64c3d6b6ca6a66f2b
SHA1d29aed1f647f35a5c8d1025b7b36369e8e65745e
SHA25612c06f8115c51525cdb4e04fa187d5c4f7244515a72b45b8b6c96bc63e97528f
SHA51286c988103180b6057f580f6d46515b262fc4530c1fe5b3cfba0bcdb6b12e2bc9495334cc03a02f30b884608bd1ae6aee17326613f1ff1fe8cac84a0bded267d2
-
Filesize
680B
MD5ceb11bd63f2ed02a4905149ffb2ebc10
SHA1e10bd6f60ca13caaa13193742fd9deaa361ea788
SHA256a3ff03402b96acec05ef49348147e7f847f466c9c4f73574c341de9fa60f8ec3
SHA5121be7ba7c4d3a805bf653722410efa44fd350a31083a98ae01494adbb876b3c02b02e2b4f69634adc90c2ff176ad10cb76541335581f5ee4b88c1bdce47e87f31