Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
152s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:01
Behavioral task
behavioral1
Sample
fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe
Resource
win7-20220812-en
General
-
Target
fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe
-
Size
143KB
-
MD5
debc4110e4f83e15d9775e0b701b543c
-
SHA1
59f852457a38d6f9a2048d2fc40521ef11f21fce
-
SHA256
fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672
-
SHA512
86c470380b444382d952938414a7603c549f43a7e2cfbd6c389313016764c38472a8fad8b6e1ae6ab7d3f6a5b4ed63414220a39a8bccee7cebe2a8416dd09bb7
-
SSDEEP
3072:yywZSQpKa3VGVnpUlCz764/9xpEEBqbZuwk5iGMuRqovC:y5JVGpxx9b3wZuwk4Glqo
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x0008000000022e07-132.dat family_gh0strat behavioral2/files/0x000a000000022e13-133.dat family_gh0strat behavioral2/files/0x000a000000022e13-134.dat family_gh0strat behavioral2/files/0x0008000000022e07-136.dat family_gh0strat -
Loads dropped DLL 2 IoCs
pid Process 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe 1140 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\FileName.jpg fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe File opened for modification C:\Windows\FileName.jpg fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe 1140 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeRestorePrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeBackupPrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeRestorePrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeBackupPrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeRestorePrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeBackupPrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe Token: SeRestorePrivilege 1648 fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe"C:\Users\Admin\AppData\Local\Temp\fe570af16d3602ce58eb9ff25546c24f2388bf093618a4215f0d5138dbbf3672.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1648
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1140
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5549c8de8ab07f88123e0e6bdb70dd073
SHA1d23f0586159dacdd3d96a7a88bcae1529873f85f
SHA25679cb99f704006b0dd2b1a29ce5019d1f6d8958500bfebc7f4f9ff62ef97ae888
SHA512492b02bf6311d55cde4a2f15f8d171ebcee622e1b7419b74b5392b5cb145a11ff5b30c2db138d97b566ddc8ee239cb1ed8920c3e4e60a9868e13b4e278df8126
-
Filesize
101KB
MD5549c8de8ab07f88123e0e6bdb70dd073
SHA1d23f0586159dacdd3d96a7a88bcae1529873f85f
SHA25679cb99f704006b0dd2b1a29ce5019d1f6d8958500bfebc7f4f9ff62ef97ae888
SHA512492b02bf6311d55cde4a2f15f8d171ebcee622e1b7419b74b5392b5cb145a11ff5b30c2db138d97b566ddc8ee239cb1ed8920c3e4e60a9868e13b4e278df8126
-
Filesize
8.0MB
MD5836b5605704b8e1bf8344c3eaefe5911
SHA1802276d0f190eee97172e9ffa5169caf0775ec48
SHA25648eeacc2c358f5f6b65f53c0984c5e1bf78e49b8286c93c4eecee3c7c79d559e
SHA51269d14c91bc01919cd5b3bd24b62024d70d2b7223a3d89ca19ea97ee35e2bdd4cce29465df05da394d53f1cbbfa0ae970b2105980a2b177bc02cca07caf574496
-
Filesize
116B
MD58f72959f9e266a5f1888ad062d984bc4
SHA10ba526ecaf448ba476a434b13fc0e1a3ba359cd7
SHA2565a7c194e0829468b330dbd317138765bd607ae19de6d5a039c1d2d2ce4a1dbd6
SHA512806a41f569f032a195007b99672a86b0523e15be67722a3ff37c3cf8063881e98600cf3758df804f066a1a85abe4bcd495696a3e7f188ea7bb72bedb6cb5050d
-
Filesize
8.0MB
MD5836b5605704b8e1bf8344c3eaefe5911
SHA1802276d0f190eee97172e9ffa5169caf0775ec48
SHA25648eeacc2c358f5f6b65f53c0984c5e1bf78e49b8286c93c4eecee3c7c79d559e
SHA51269d14c91bc01919cd5b3bd24b62024d70d2b7223a3d89ca19ea97ee35e2bdd4cce29465df05da394d53f1cbbfa0ae970b2105980a2b177bc02cca07caf574496