Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
133s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 17:57
Static task
static1
Behavioral task
behavioral1
Sample
d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe
Resource
win10v2004-20220901-en
General
-
Target
d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe
-
Size
272KB
-
MD5
4b74fa308c2c26b0f71757565b8951e9
-
SHA1
eadcfbe0a4dadd531a1cd750b10adbefabb5f749
-
SHA256
d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1
-
SHA512
58fd4aaf9017cb81f0874ce4e29d57fb236ef11aac61862288269a19c5673f6823860586abbe7ede2e21bd13aa8e8f79f5288ae533a3bc7af208217d3ddae64b
-
SSDEEP
6144:ALge5sXPoBQfFMa36PaS+CGsoozQ9bVx0uL5wy:QgeEoiaaqaS+fkgx0uL
Malware Config
Signatures
-
Gh0st RAT payload 8 IoCs
resource yara_rule behavioral1/files/0x0009000000012677-63.dat family_gh0strat behavioral1/memory/2032-64-0x0000000000400000-0x0000000000482000-memory.dmp family_gh0strat behavioral1/files/0x0009000000012677-70.dat family_gh0strat behavioral1/files/0x0009000000012677-72.dat family_gh0strat behavioral1/files/0x0009000000012677-71.dat family_gh0strat behavioral1/files/0x0009000000012677-73.dat family_gh0strat behavioral1/memory/2004-74-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/2032-86-0x0000000000400000-0x0000000000482000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2004 ctfn0m.ini 1888 ctsstm.exe -
Deletes itself 1 IoCs
pid Process 280 cmd.exe -
Loads dropped DLL 9 IoCs
pid Process 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 2004 ctfn0m.ini 2004 ctfn0m.ini 2004 ctfn0m.ini 2004 ctfn0m.ini 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 1888 ctsstm.exe 1888 ctsstm.exe 1888 ctsstm.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ctfn0m.ini -
Drops file in Program Files directory 6 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\loveuu.png d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe File created C:\Program Files\Common Files\loveuu.png d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe File created C:\Program Files\Common Files\ctfn0m.ini d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe File opened for modification C:\Program Files\Common Files\ctfn0m.ini d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe File created C:\Program Files\Common Files\loveuu.bat d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe File created C:\Program Files\worubkk\gnthfsum.exe d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1264 sc.exe 1532 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ctfn0m.ini Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ctfn0m.ini -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2004 ctfn0m.ini 2004 ctfn0m.ini -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 2004 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 28 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1532 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 29 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1264 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 30 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 2032 wrote to memory of 1888 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 33 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 1888 wrote to memory of 1660 1888 ctsstm.exe 34 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35 PID 2032 wrote to memory of 280 2032 d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe"C:\Users\Admin\AppData\Local\Temp\d8fd5256f3d4e921ede509635478ac04f964f0ca278003aa7e3c94579ffb37b1.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Common Files\ctfn0m.ini"C:\Program Files\Common Files\ctfn0m.ini" "C:\Program Files\worubkk\gnthfsum.exe" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2004
-
-
C:\Windows\SysWOW64\sc.exesc config RasAuto start= auto2⤵
- Launches sc.exe
PID:1532
-
-
C:\Windows\SysWOW64\sc.exesc config RasAuto start= auto2⤵
- Launches sc.exe
PID:1264
-
-
C:\Documents and Settings\ctsstm.exe"C:\Documents and Settings\ctsstm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\ctsstm.exe3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\D8FD52~1.EXE2⤵
- Deletes itself
PID:280
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.5MB
MD53a1bdc977fbede7d3e76059754b17831
SHA1ee89dcf7f8ccc33f1c7d768482627da0c681b1bb
SHA256f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9
SHA512bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
27.1MB
MD58d9bd1cdc6a009cda8c98b87d465b3ea
SHA1119f74f6d4858a3a243d53c127e45f03e31c25f0
SHA25656acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac
SHA51275137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d
-
Filesize
10.5MB
MD53a1bdc977fbede7d3e76059754b17831
SHA1ee89dcf7f8ccc33f1c7d768482627da0c681b1bb
SHA256f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9
SHA512bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
27.1MB
MD58d9bd1cdc6a009cda8c98b87d465b3ea
SHA1119f74f6d4858a3a243d53c127e45f03e31c25f0
SHA25656acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac
SHA51275137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d
-
Filesize
27.1MB
MD58d9bd1cdc6a009cda8c98b87d465b3ea
SHA1119f74f6d4858a3a243d53c127e45f03e31c25f0
SHA25656acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac
SHA51275137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d
-
Filesize
27.1MB
MD58d9bd1cdc6a009cda8c98b87d465b3ea
SHA1119f74f6d4858a3a243d53c127e45f03e31c25f0
SHA25656acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac
SHA51275137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d
-
Filesize
27.1MB
MD58d9bd1cdc6a009cda8c98b87d465b3ea
SHA1119f74f6d4858a3a243d53c127e45f03e31c25f0
SHA25656acbd7417d8de358032f8f3c07304987a6e2c018d3459726fa79f1d50c5eeac
SHA51275137a8e0b6a937b79207d00eec013e4eab2da2654baba801067384e5f2a1e908c563dfc157753c29ed51d0afc2afba296e110db90ea5d5e098b959b0edfea6d
-
Filesize
10.5MB
MD53a1bdc977fbede7d3e76059754b17831
SHA1ee89dcf7f8ccc33f1c7d768482627da0c681b1bb
SHA256f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9
SHA512bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c
-
Filesize
10.5MB
MD53a1bdc977fbede7d3e76059754b17831
SHA1ee89dcf7f8ccc33f1c7d768482627da0c681b1bb
SHA256f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9
SHA512bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c
-
Filesize
10.5MB
MD53a1bdc977fbede7d3e76059754b17831
SHA1ee89dcf7f8ccc33f1c7d768482627da0c681b1bb
SHA256f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9
SHA512bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c
-
Filesize
10.5MB
MD53a1bdc977fbede7d3e76059754b17831
SHA1ee89dcf7f8ccc33f1c7d768482627da0c681b1bb
SHA256f941d4105193791e8ece7cae565c76d6757cc58246c034fd1620b29cd9dc73e9
SHA512bc32f8fdae6055a668ebf6191a402ee78ce12076e703314d880982a7695d5af471356aed6f7908b345cec12f4e265bed21170b8b5c8b4a94fa916393a4f49e0c