Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
198s -
max time network
234s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 21:45
Behavioral task
behavioral1
Sample
e15e51d84f7bb087d0d9722d3ff7d376dc9469f490cdd7424b0992720b276ebd.dll
Resource
win7-20220812-en
General
-
Target
e15e51d84f7bb087d0d9722d3ff7d376dc9469f490cdd7424b0992720b276ebd.dll
-
Size
133KB
-
MD5
b8f6ee37da1463c2c68c45eccb8c3270
-
SHA1
ab96af06f7f0d8a4499405ca014dd0120432a297
-
SHA256
e15e51d84f7bb087d0d9722d3ff7d376dc9469f490cdd7424b0992720b276ebd
-
SHA512
9f2808d474e807d95b366a7683ec5186636cef444b2a36164d8c51f9b9bc61652afa38bf6cafa4791b111d59f8f7a34735694bfd1c49092743089c127fef4545
-
SSDEEP
3072:wixrcYyNNBxIf58d6UuSMhXk22T94oz7vEEZzcdzJO:BANBxIxh0u4TSg7vECzcR0
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/files/0x000f00000002313d-133.dat family_gh0strat behavioral2/files/0x000f00000002313d-134.dat family_gh0strat -
Loads dropped DLL 1 IoCs
pid Process 4768 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Bwxy\Gwxyabcde.gif rundll32.exe File opened for modification C:\Program Files (x86)\Bwxy\Gwxyabcde.gif rundll32.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe 4768 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 4280 rundll32.exe Token: SeRestorePrivilege 4280 rundll32.exe Token: SeBackupPrivilege 4280 rundll32.exe Token: SeRestorePrivilege 4280 rundll32.exe Token: SeBackupPrivilege 4280 rundll32.exe Token: SeRestorePrivilege 4280 rundll32.exe Token: SeBackupPrivilege 4280 rundll32.exe Token: SeRestorePrivilege 4280 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4528 wrote to memory of 4280 4528 rundll32.exe 82 PID 4528 wrote to memory of 4280 4528 rundll32.exe 82 PID 4528 wrote to memory of 4280 4528 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e15e51d84f7bb087d0d9722d3ff7d376dc9469f490cdd7424b0992720b276ebd.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e15e51d84f7bb087d0d9722d3ff7d376dc9469f490cdd7424b0992720b276ebd.dll,#12⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:4768
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14.5MB
MD57c0f6c040d1f9f1d628006c0715ace86
SHA13a00c19c090adb171716fc794247f235be71f82f
SHA256f8ec03c6930cf7582307ef37e7a0c5960949d1b3bc1a3586aaf790e906af356e
SHA512a940a4161881be5d7940a170cfc93bf1a5251667ae964d556fc511f44ced152b1787685ff35e8dc59613c4124899c5e2d597c6a8d980402ab68ab9cb6bd3b5e1
-
Filesize
14.5MB
MD57c0f6c040d1f9f1d628006c0715ace86
SHA13a00c19c090adb171716fc794247f235be71f82f
SHA256f8ec03c6930cf7582307ef37e7a0c5960949d1b3bc1a3586aaf790e906af356e
SHA512a940a4161881be5d7940a170cfc93bf1a5251667ae964d556fc511f44ced152b1787685ff35e8dc59613c4124899c5e2d597c6a8d980402ab68ab9cb6bd3b5e1