Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
158s -
max time network
108s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 19:30
Static task
static1
Behavioral task
behavioral1
Sample
f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe
Resource
win10v2004-20221111-en
General
-
Target
f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe
-
Size
183KB
-
MD5
f655dcae34c54f1d9fdd88ec300eddcc
-
SHA1
b2fe35cfd45f06862a69877d2c1c932194ad3958
-
SHA256
f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29
-
SHA512
84a9be89c9404e0eb3a30b640252526858f4693f56ca6c25129e50da27e2fd98ad77257fb2f6854d6ae850a8821c75bdabd7af609a02d19cd64f311855ea7da1
-
SSDEEP
3072:bMqKbTtCSIT0chwzzcdZKF8UvvoeWofjjpAVioRF8s//NLj6h+EvtR9:o9MMmwzlqUHoeWofjjpAViY/lH6h+Ev9
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1956-57-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral1/memory/1956-60-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXAC994E22 = "C:\\Windows\\XXXXXXAC994E22\\svchsot.exe" f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\XXXXXXAC994E22\JH.BAT f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 976 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1956 wrote to memory of 564 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 28 PID 1956 wrote to memory of 564 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 28 PID 1956 wrote to memory of 564 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 28 PID 1956 wrote to memory of 564 1956 f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe 28 PID 564 wrote to memory of 676 564 cmd.exe 30 PID 564 wrote to memory of 676 564 cmd.exe 30 PID 564 wrote to memory of 676 564 cmd.exe 30 PID 564 wrote to memory of 676 564 cmd.exe 30 PID 564 wrote to memory of 976 564 cmd.exe 31 PID 564 wrote to memory of 976 564 cmd.exe 31 PID 564 wrote to memory of 976 564 cmd.exe 31 PID 564 wrote to memory of 976 564 cmd.exe 31 PID 564 wrote to memory of 1572 564 cmd.exe 32 PID 564 wrote to memory of 1572 564 cmd.exe 32 PID 564 wrote to memory of 1572 564 cmd.exe 32 PID 564 wrote to memory of 1572 564 cmd.exe 32 PID 1572 wrote to memory of 1932 1572 net.exe 33 PID 1572 wrote to memory of 1932 1572 net.exe 33 PID 1572 wrote to memory of 1932 1572 net.exe 33 PID 1572 wrote to memory of 1932 1572 net.exe 33 PID 564 wrote to memory of 892 564 cmd.exe 34 PID 564 wrote to memory of 892 564 cmd.exe 34 PID 564 wrote to memory of 892 564 cmd.exe 34 PID 564 wrote to memory of 892 564 cmd.exe 34 PID 564 wrote to memory of 628 564 cmd.exe 35 PID 564 wrote to memory of 628 564 cmd.exe 35 PID 564 wrote to memory of 628 564 cmd.exe 35 PID 564 wrote to memory of 628 564 cmd.exe 35 PID 564 wrote to memory of 1148 564 cmd.exe 36 PID 564 wrote to memory of 1148 564 cmd.exe 36 PID 564 wrote to memory of 1148 564 cmd.exe 36 PID 564 wrote to memory of 1148 564 cmd.exe 36 PID 564 wrote to memory of 692 564 cmd.exe 37 PID 564 wrote to memory of 692 564 cmd.exe 37 PID 564 wrote to memory of 692 564 cmd.exe 37 PID 564 wrote to memory of 692 564 cmd.exe 37 PID 564 wrote to memory of 928 564 cmd.exe 38 PID 564 wrote to memory of 928 564 cmd.exe 38 PID 564 wrote to memory of 928 564 cmd.exe 38 PID 564 wrote to memory of 928 564 cmd.exe 38 PID 564 wrote to memory of 1084 564 cmd.exe 39 PID 564 wrote to memory of 1084 564 cmd.exe 39 PID 564 wrote to memory of 1084 564 cmd.exe 39 PID 564 wrote to memory of 1084 564 cmd.exe 39 PID 564 wrote to memory of 1464 564 cmd.exe 40 PID 564 wrote to memory of 1464 564 cmd.exe 40 PID 564 wrote to memory of 1464 564 cmd.exe 40 PID 564 wrote to memory of 1464 564 cmd.exe 40 PID 564 wrote to memory of 1060 564 cmd.exe 41 PID 564 wrote to memory of 1060 564 cmd.exe 41 PID 564 wrote to memory of 1060 564 cmd.exe 41 PID 564 wrote to memory of 1060 564 cmd.exe 41 PID 564 wrote to memory of 1224 564 cmd.exe 42 PID 564 wrote to memory of 1224 564 cmd.exe 42 PID 564 wrote to memory of 1224 564 cmd.exe 42 PID 564 wrote to memory of 1224 564 cmd.exe 42 PID 564 wrote to memory of 1720 564 cmd.exe 43 PID 564 wrote to memory of 1720 564 cmd.exe 43 PID 564 wrote to memory of 1720 564 cmd.exe 43 PID 564 wrote to memory of 1720 564 cmd.exe 43 PID 564 wrote to memory of 1636 564 cmd.exe 44 PID 564 wrote to memory of 1636 564 cmd.exe 44 PID 564 wrote to memory of 1636 564 cmd.exe 44 PID 564 wrote to memory of 1636 564 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe"C:\Users\Admin\AppData\Local\Temp\f25d5aaf5db75844d979878065bf9459e457b19a57b31a97ff653e07fc637b29.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXXAC994E22\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:676
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:976
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:1932
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:892
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:628
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1148
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:692
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:928
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1084
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1464
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1060
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1224
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1720
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:1636
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:576
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:772
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXXAC994E22\svchsot.exe3⤵PID:588
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD509f56ef791dec22839b2aae30a1a71f0
SHA134d232a67c48de2f67829af06e9074a44b5ef45c
SHA2563ee3b25a494748e4e897ddab75c7b5f61ba71e7fbbaa3d11fc375c59fa4c4acd
SHA5123b8e5f0b7d9239baa03b10204790ee97d7d27cb9b17d1b4089fa332f393b40d03915df6283cd394c97e1eda26282c497a9da4d8a931020000cdd15581bd4985e