Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    151s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 21:12 UTC

General

  • Target

    613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025.exe

  • Size

    919KB

  • MD5

    1ce18d93bddd3b07001129742055f73f

  • SHA1

    36113a76b9ed96ce38656a6b2e2142d45ea7147d

  • SHA256

    613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025

  • SHA512

    36920b77cf4017d1df2a7aefa7d552dce3bb6204c6979aa5c5a16916321ba1d3bc1dde7d4cbab33231c64fa612d5a47595e84b9922d6caacddc21312980ff3e9

  • SSDEEP

    12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ1vgSn:iM5j8Z3aKHx5r+TuxX+IwffFZ1vgSn

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025.exe
    "C:\Users\Admin\AppData\Local\Temp\613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:2032
    • \??\c:\Windows\svchest001465662051.exe
      c:\Windows\svchest001465662051.exe
      2⤵
      • Executes dropped EXE
      PID:1988

Network

  • flag-unknown
    DNS
    sfwu.3322.org
    613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025.exe
    Remote address:
    8.8.8.8:53
    Request
    sfwu.3322.org
    IN A
    Response
    sfwu.3322.org
    IN A
    157.122.62.205
  • 157.122.62.205:7900
    sfwu.3322.org
    613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025.exe
    152 B
    3
  • 8.8.8.8:53
    sfwu.3322.org
    dns
    613cd3ad0f822e5b5c2c5091f91b37ba13d2da5bd98d2e9f11991d394733a025.exe
    59 B
    75 B
    1
    1

    DNS Request

    sfwu.3322.org

    DNS Response

    157.122.62.205

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest001465662051.exe

    Filesize

    919KB

    MD5

    882b13c3087af86f8686cb7547779c54

    SHA1

    acb23cc1233ef04d6a7920209f958b2c2ab4bdac

    SHA256

    e8f2961a7e33ccf09d6697cf050e84486be33343bcb6ed638b331a4717f60ed6

    SHA512

    96e239dba89cc2bae42bf92d14afc918871a2d3f501e18483ac71d07ea6b5547529fc109c9e01c37110ccdcd4c38ec1e8ecca1906460e61c25c1c37118c4f82b

  • memory/2032-54-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.