Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    133s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 17:57

General

  • Target

    d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe

  • Size

    272KB

  • MD5

    4b74fa308c2c26b0f71757565b8951e9

  • SHA1

    eadcfbe0a4dadd531a1cd750b10adbefabb5f749

  • SHA256

    d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1

  • SHA512

    58fd4aaf9017cb81f0874ce4e29d57fb236ef11aac61862288269a19c5673f6823860586abbe7ede2e21bd13aa8e8f79f5288ae533a3bc7af208217d3ddae64b

  • SSDEEP

    6144:ALge5sXPoBQfFMa36PaS+CGsoozQ9bVx0uL5wy:QgeEoiaaqaS+fkgx0uL

Malware Config

Signatures

  • Gh0st RAT payload 8 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 6 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe
    "C:\Users\Admin\AppData\Local\Temp\d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Program Files\Common Files\ctfn0m.ini
      "C:\Program Files\Common Files\ctfn0m.ini" "C:\Program Files\worubkk\gnthfsum.exe" ServiceMain
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2004
    • C:\Windows\SysWOW64\sc.exe
      sc config RasAuto start= auto
      2⤵
      • Launches sc.exe
      PID:1532
    • C:\Windows\SysWOW64\sc.exe
      sc config RasAuto start= auto
      2⤵
      • Launches sc.exe
      PID:1264
    • C:\Documents and Settings\ctsstm.exe
      "C:\Documents and Settings\ctsstm.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\DOCUME~1\ctsstm.exe
        3⤵
          PID:1660
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Users\Admin\AppData\Local\Temp\D8FD52~1.EXE
        2⤵
        • Deletes itself
        PID:280

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Documents and Settings\ctsstm.exe

      Filesize

      10.5MB

      MD5

      3a1bdc977fbede7d3e76059754b17831

      SHA1

      ee89dcf7f8ccc33f1c7d768482627da0c681b1bb

      SHA256

      f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9

      SHA512

      bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c

    • C:\Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Program Files\worubkk\gnthfsum.exe

      Filesize

      27.1MB

      MD5

      8d9bd1cdc6a009cda8c98b87d465b3ea

      SHA1

      119f74f6d4858a3a243d53c127e45f03e31c25f0

      SHA256

      56acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac

      SHA512

      75137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d

    • C:\Users\ctsstm.exe

      Filesize

      10.5MB

      MD5

      3a1bdc977fbede7d3e76059754b17831

      SHA1

      ee89dcf7f8ccc33f1c7d768482627da0c681b1bb

      SHA256

      f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9

      SHA512

      bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c

    • \Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Program Files\worubkk\gnthfsum.exe

      Filesize

      27.1MB

      MD5

      8d9bd1cdc6a009cda8c98b87d465b3ea

      SHA1

      119f74f6d4858a3a243d53c127e45f03e31c25f0

      SHA256

      56acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac

      SHA512

      75137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d

    • \Program Files\worubkk\gnthfsum.exe

      Filesize

      27.1MB

      MD5

      8d9bd1cdc6a009cda8c98b87d465b3ea

      SHA1

      119f74f6d4858a3a243d53c127e45f03e31c25f0

      SHA256

      56acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac

      SHA512

      75137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d

    • \Program Files\worubkk\gnthfsum.exe

      Filesize

      27.1MB

      MD5

      8d9bd1cdc6a009cda8c98b87d465b3ea

      SHA1

      119f74f6d4858a3a243d53c127e45f03e31c25f0

      SHA256

      56acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac

      SHA512

      75137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d

    • \Program Files\worubkk\gnthfsum.exe

      Filesize

      27.1MB

      MD5

      8d9bd1cdc6a009cda8c98b87d465b3ea

      SHA1

      119f74f6d4858a3a243d53c127e45f03e31c25f0

      SHA256

      56acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac

      SHA512

      75137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d

    • \Users\ctsstm.exe

      Filesize

      10.5MB

      MD5

      3a1bdc977fbede7d3e76059754b17831

      SHA1

      ee89dcf7f8ccc33f1c7d768482627da0c681b1bb

      SHA256

      f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9

      SHA512

      bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c

    • \Users\ctsstm.exe

      Filesize

      10.5MB

      MD5

      3a1bdc977fbede7d3e76059754b17831

      SHA1

      ee89dcf7f8ccc33f1c7d768482627da0c681b1bb

      SHA256

      f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9

      SHA512

      bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c

    • \Users\ctsstm.exe

      Filesize

      10.5MB

      MD5

      3a1bdc977fbede7d3e76059754b17831

      SHA1

      ee89dcf7f8ccc33f1c7d768482627da0c681b1bb

      SHA256

      f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9

      SHA512

      bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c

    • \Users\ctsstm.exe

      Filesize

      10.5MB

      MD5

      3a1bdc977fbede7d3e76059754b17831

      SHA1

      ee89dcf7f8ccc33f1c7d768482627da0c681b1bb

      SHA256

      f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9

      SHA512

      bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c

    • memory/1888-85-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2004-74-0x0000000020000000-0x0000000020027000-memory.dmp

      Filesize

      156KB

    • memory/2032-64-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/2032-56-0x0000000000360000-0x00000000003E2000-memory.dmp

      Filesize

      520KB

    • memory/2032-57-0x0000000000250000-0x000000000028E000-memory.dmp

      Filesize

      248KB

    • memory/2032-54-0x0000000076031000-0x0000000076033000-memory.dmp

      Filesize

      8KB

    • memory/2032-55-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/2032-65-0x0000000000250000-0x000000000028E000-memory.dmp

      Filesize

      248KB

    • memory/2032-87-0x0000000000250000-0x000000000028E000-memory.dmp

      Filesize

      248KB

    • memory/2032-86-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB