Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe
Resource
win10v2004-20220812-en
General
-
Target
89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe
-
Size
272KB
-
MD5
65541ea7390ffa6f04aee7b4ff992edc
-
SHA1
17c833d5654223796facaacf3dc4ddcd8f023548
-
SHA256
89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf
-
SHA512
ce22cb824100a69a14cc6446f2bddc08d58d535ae01d6b8622fc78ef50db243ec1f88cd208ad8ae055278993e5e98b189930f0f31348cac020acfab4a0408f10
-
SSDEEP
6144:VogecmWtyoRgCHsM8/aMOf9hb4GsoozQ9bVxZaQE:+gecmCyYgC58/grxkgxQ
Malware Config
Signatures
-
Gh0st RAT payload 6 IoCs
resource yara_rule behavioral1/memory/988-55-0x0000000000400000-0x0000000000482000-memory.dmp family_gh0strat behavioral1/files/0x0007000000014864-62.dat family_gh0strat behavioral1/files/0x0007000000014864-63.dat family_gh0strat behavioral1/memory/888-64-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat behavioral1/memory/988-84-0x0000000000400000-0x0000000000482000-memory.dmp family_gh0strat behavioral1/memory/888-88-0x0000000020000000-0x0000000020027000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 888 ctfn0m.ini 824 ctvukm.exe -
Deletes itself 1 IoCs
pid Process 624 cmd.exe -
Loads dropped DLL 6 IoCs
pid Process 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 888 ctfn0m.ini 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 824 ctvukm.exe 824 ctvukm.exe 824 ctvukm.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 ctfn0m.ini -
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files\Common Files\ctfn0m.bat 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe File created C:\Program Files\bpwophq\hhwwdpgo.vuk 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe File opened for modification C:\Program Files\Common Files\safesa.jpg 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe File created C:\Program Files\Common Files\safesa.jpg 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe File created C:\Program Files\Common Files\ctfn0m.ini 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe File opened for modification C:\Program Files\Common Files\ctfn0m.ini 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1872 sc.exe 1108 sc.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ctfn0m.ini Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ctfn0m.ini -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 888 ctfn0m.ini 888 ctfn0m.ini 888 ctfn0m.ini -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 888 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 27 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1872 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 28 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 1108 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 29 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 988 wrote to memory of 824 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 32 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 824 wrote to memory of 1516 824 ctvukm.exe 33 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36 PID 988 wrote to memory of 624 988 89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe"C:\Users\Admin\AppData\Local\Temp\89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Program Files\Common Files\ctfn0m.ini"C:\Program Files\Common Files\ctfn0m.ini" "C:\Program Files\bpwophq\hhwwdpgo.vuk" ServiceMain2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Windows\SysWOW64\sc.exesc config RasAuto start= auto2⤵
- Launches sc.exe
PID:1872
-
-
C:\Windows\SysWOW64\sc.exesc config RasAuto start= auto2⤵
- Launches sc.exe
PID:1108
-
-
C:\Documents and Settings\ctvukm.exe"C:\Documents and Settings\ctvukm.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\cmd.execmd /c del C:\DOCUME~1\ctvukm.exe3⤵PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\Users\Admin\AppData\Local\Temp\89E34B~1.EXE2⤵
- Deletes itself
PID:624
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24.0MB
MD58533159bac77132fef2144bb739a2b40
SHA1b9b353b815f0816905fa8788866b7bb06b1537b3
SHA2566e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4
SHA512923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.1MB
MD53f14c04accf6c5ed1d1e42decf1a07a3
SHA1eb7c40ce9984305bceffbfead3acc4a0ccb3b186
SHA25677548660bebc11f8a90d29d30b80bac312215bd96ab231d1a4a361d3cb23d6d7
SHA512802dbac11e9c2de424a19ce14ec4ed62c075109395c4b1a06eaa6280de9d1acfda523b6dbc2f93bb330b009cddb4ca03b1ac13d72e0b940b0e7fcaeec814a9f4
-
Filesize
24.0MB
MD58533159bac77132fef2144bb739a2b40
SHA1b9b353b815f0816905fa8788866b7bb06b1537b3
SHA2566e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4
SHA512923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d
-
Filesize
24.1MB
MD53f14c04accf6c5ed1d1e42decf1a07a3
SHA1eb7c40ce9984305bceffbfead3acc4a0ccb3b186
SHA25677548660bebc11f8a90d29d30b80bac312215bd96ab231d1a4a361d3cb23d6d7
SHA512802dbac11e9c2de424a19ce14ec4ed62c075109395c4b1a06eaa6280de9d1acfda523b6dbc2f93bb330b009cddb4ca03b1ac13d72e0b940b0e7fcaeec814a9f4
-
Filesize
24.0MB
MD58533159bac77132fef2144bb739a2b40
SHA1b9b353b815f0816905fa8788866b7bb06b1537b3
SHA2566e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4
SHA512923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800
-
Filesize
24.0MB
MD58533159bac77132fef2144bb739a2b40
SHA1b9b353b815f0816905fa8788866b7bb06b1537b3
SHA2566e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4
SHA512923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800
-
Filesize
24.0MB
MD58533159bac77132fef2144bb739a2b40
SHA1b9b353b815f0816905fa8788866b7bb06b1537b3
SHA2566e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4
SHA512923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800
-
Filesize
24.0MB
MD58533159bac77132fef2144bb739a2b40
SHA1b9b353b815f0816905fa8788866b7bb06b1537b3
SHA2566e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4
SHA512923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800