Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/12/2022, 01:34

General

  • Target

    89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe

  • Size

    272KB

  • MD5

    65541ea7390ffa6f04aee7b4ff992edc

  • SHA1

    17c833d5654223796facaacf3dc4ddcd8f023548

  • SHA256

    89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf

  • SHA512

    ce22cb824100a69a14cc6446f2bddc08d58d535ae01d6b8622fc78ef50db243ec1f88cd208ad8ae055278993e5e98b189930f0f31348cac020acfab4a0408f10

  • SSDEEP

    6144:VogecmWtyoRgCHsM8/aMOf9hb4GsoozQ9bVxZaQE:+gecmCyYgC58/grxkgxQ

Malware Config

Signatures

  • Gh0st RAT payload 6 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 2 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in Program Files directory 6 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe
    "C:\Users\Admin\AppData\Local\Temp\89e34b63d109a1853831174df738766012df2a48f3eff58ad71fb6e421bcdecf.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:988
    • C:\Program Files\Common Files\ctfn0m.ini
      "C:\Program Files\Common Files\ctfn0m.ini" "C:\Program Files\bpwophq\hhwwdpgo.vuk" ServiceMain
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Writes to the Master Boot Record (MBR)
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:888
    • C:\Windows\SysWOW64\sc.exe
      sc config RasAuto start= auto
      2⤵
      • Launches sc.exe
      PID:1872
    • C:\Windows\SysWOW64\sc.exe
      sc config RasAuto start= auto
      2⤵
      • Launches sc.exe
      PID:1108
    • C:\Documents and Settings\ctvukm.exe
      "C:\Documents and Settings\ctvukm.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:824
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\DOCUME~1\ctvukm.exe
        3⤵
          PID:1516
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c del C:\Users\Admin\AppData\Local\Temp\89E34B~1.EXE
        2⤵
        • Deletes itself
        PID:624

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Documents and Settings\ctvukm.exe

      Filesize

      24.0MB

      MD5

      8533159bac77132fef2144bb739a2b40

      SHA1

      b9b353b815f0816905fa8788866b7bb06b1537b3

      SHA256

      6e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4

      SHA512

      923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800

    • C:\Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • C:\Program Files\bpwophq\hhwwdpgo.vuk

      Filesize

      24.1MB

      MD5

      3f14c04accf6c5ed1d1e42decf1a07a3

      SHA1

      eb7c40ce9984305bceffbfead3acc4a0ccb3b186

      SHA256

      77548660bebc11f8a90d29d30b80bac312215bd96ab231d1a4a361d3cb23d6d7

      SHA512

      802dbac11e9c2de424a19ce14ec4ed62c075109395c4b1a06eaa6280de9d1acfda523b6dbc2f93bb330b009cddb4ca03b1ac13d72e0b940b0e7fcaeec814a9f4

    • C:\Users\ctvukm.exe

      Filesize

      24.0MB

      MD5

      8533159bac77132fef2144bb739a2b40

      SHA1

      b9b353b815f0816905fa8788866b7bb06b1537b3

      SHA256

      6e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4

      SHA512

      923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800

    • \Program Files\Common Files\ctfn0m.ini

      Filesize

      43KB

      MD5

      51138beea3e2c21ec44d0932c71762a8

      SHA1

      8939cf35447b22dd2c6e6f443446acc1bf986d58

      SHA256

      5ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124

      SHA512

      794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d

    • \Program Files\bpwophq\hhwwdpgo.vuk

      Filesize

      24.1MB

      MD5

      3f14c04accf6c5ed1d1e42decf1a07a3

      SHA1

      eb7c40ce9984305bceffbfead3acc4a0ccb3b186

      SHA256

      77548660bebc11f8a90d29d30b80bac312215bd96ab231d1a4a361d3cb23d6d7

      SHA512

      802dbac11e9c2de424a19ce14ec4ed62c075109395c4b1a06eaa6280de9d1acfda523b6dbc2f93bb330b009cddb4ca03b1ac13d72e0b940b0e7fcaeec814a9f4

    • \Users\ctvukm.exe

      Filesize

      24.0MB

      MD5

      8533159bac77132fef2144bb739a2b40

      SHA1

      b9b353b815f0816905fa8788866b7bb06b1537b3

      SHA256

      6e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4

      SHA512

      923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800

    • \Users\ctvukm.exe

      Filesize

      24.0MB

      MD5

      8533159bac77132fef2144bb739a2b40

      SHA1

      b9b353b815f0816905fa8788866b7bb06b1537b3

      SHA256

      6e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4

      SHA512

      923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800

    • \Users\ctvukm.exe

      Filesize

      24.0MB

      MD5

      8533159bac77132fef2144bb739a2b40

      SHA1

      b9b353b815f0816905fa8788866b7bb06b1537b3

      SHA256

      6e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4

      SHA512

      923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800

    • \Users\ctvukm.exe

      Filesize

      24.0MB

      MD5

      8533159bac77132fef2144bb739a2b40

      SHA1

      b9b353b815f0816905fa8788866b7bb06b1537b3

      SHA256

      6e52bc8e89b1d98bfb03e279516f1b875777739bca80b1065ea73e46e65b11b4

      SHA512

      923b8545f8153baae237ba2ae4073dacd2a07dfd9f95a1556b6dd5ee3024923570c18378e817aa9cb915a7a24578c0de1f88166e4d2a47174624140ee2eb3800

    • memory/824-82-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/824-80-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/824-73-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/824-79-0x0000000000020000-0x0000000000028000-memory.dmp

      Filesize

      32KB

    • memory/888-64-0x0000000020000000-0x0000000020027000-memory.dmp

      Filesize

      156KB

    • memory/888-88-0x0000000020000000-0x0000000020027000-memory.dmp

      Filesize

      156KB

    • memory/988-56-0x0000000000240000-0x00000000002C2000-memory.dmp

      Filesize

      520KB

    • memory/988-55-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/988-85-0x0000000000240000-0x000000000024D000-memory.dmp

      Filesize

      52KB

    • memory/988-84-0x0000000000400000-0x0000000000482000-memory.dmp

      Filesize

      520KB

    • memory/988-72-0x00000000002C0000-0x00000000002C8000-memory.dmp

      Filesize

      32KB

    • memory/988-54-0x0000000075021000-0x0000000075023000-memory.dmp

      Filesize

      8KB