Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06/12/2022, 15:55
Behavioral task
behavioral1
Sample
aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe
Resource
win7-20220901-en
General
-
Target
aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe
-
Size
71KB
-
MD5
1d8f6aec6bdc4f530c18ac667170f82c
-
SHA1
627233894ce3c894283c61f1658944ea15c6a263
-
SHA256
aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2
-
SHA512
dfc22d815bf3e2356f45855a627defc5c1b651c2e33666250f33e89f0b5445ab4c2ecd8776ce2726c042f37d2ad6a5bb30fc31bac5b1aa5333618eecc90ac159
-
SSDEEP
1536:jWZpTtLcWyeYd4//yEZc1GJf7/QP4uiryS5e:+pZTvnyEZiGJ7/QguiryS5e
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/files/0x0007000000022f63-132.dat family_gh0strat behavioral2/files/0x000a000000022f6e-133.dat family_gh0strat behavioral2/files/0x000a000000022f6e-134.dat family_gh0strat behavioral2/files/0x0007000000022f63-136.dat family_gh0strat -
Loads dropped DLL 2 IoCs
pid Process 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe 1540 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Xtxq\Xcqpsdkvg.jpg aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe File created C:\Program Files (x86)\Xtxq\Xcqpsdkvg.jpg aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe 1540 svchost.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeRestorePrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeBackupPrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeRestorePrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeBackupPrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeRestorePrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeBackupPrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe Token: SeRestorePrivilege 1264 aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe"C:\Users\Admin\AppData\Local\Temp\aae60b0734321c13187e07987ef2622892e819354e1eef478eb520166c4c01f2.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1540
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5747cb6693b4395dfb17d801271273c83
SHA168aa34cc79dfccd8590b08eaaf9e44776420924d
SHA25656a18a9d5c006a3ae78907faba4f7ff69c8249c99fa11bfd6646d1c85d537fd2
SHA5123c8e408222bd7d8dfce02b9c6c9e99d677f507a6968865b23fe51680282809a431ec94635856d3d8e38783d70f0aaa15bb3d566d33d28cf40f944c833243e43a
-
Filesize
64KB
MD5747cb6693b4395dfb17d801271273c83
SHA168aa34cc79dfccd8590b08eaaf9e44776420924d
SHA25656a18a9d5c006a3ae78907faba4f7ff69c8249c99fa11bfd6646d1c85d537fd2
SHA5123c8e408222bd7d8dfce02b9c6c9e99d677f507a6968865b23fe51680282809a431ec94635856d3d8e38783d70f0aaa15bb3d566d33d28cf40f944c833243e43a
-
Filesize
4.1MB
MD514b917be54326b18918f224015985532
SHA1123052e7a1f5c3ae7c5b0b155cfd413a1a0742d7
SHA256324f608ff71212dc12e1772a96a19c85c339824042b4517b88975ba0f3aac350
SHA5122f7ab0d51a6d8e02d39ba9dc8e691e7c73aa7d5531b7c69025003447a70278338556c6b0edb722dca428e11591b8055557a5d7e03dd01d235f20ddf53412f48a
-
Filesize
117B
MD5c3385cff363fe815f08d006247cc740a
SHA199f9e894306d8e3beb7bd1b81a615bf76f0ffa09
SHA256acbadb9865b95acc6d39f56baf6d8da767c885b60f9fc866078db38fbf4b732f
SHA512bceebc99519775564f65c4ca0dc26f14d130e29782ae2ace162315a63b9d2193f7c53c523c71ad3852f037f0d8aae2b54e42ff6a4f888bc35abd8e77eb390836
-
Filesize
4.1MB
MD514b917be54326b18918f224015985532
SHA1123052e7a1f5c3ae7c5b0b155cfd413a1a0742d7
SHA256324f608ff71212dc12e1772a96a19c85c339824042b4517b88975ba0f3aac350
SHA5122f7ab0d51a6d8e02d39ba9dc8e691e7c73aa7d5531b7c69025003447a70278338556c6b0edb722dca428e11591b8055557a5d7e03dd01d235f20ddf53412f48a