Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/05/2023, 09:01
Static task
static1
Behavioral task
behavioral1
Sample
5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe
Resource
win7-20230220-en
General
-
Target
5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe
-
Size
1.3MB
-
MD5
f3eab5e140210e0e4ff2ff625b2ffe21
-
SHA1
610fa43452f5cde3800a2ca81ce14e36a1dd3d6c
-
SHA256
5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42
-
SHA512
98cfb85663ecf5165f979fb76ab3302ea071cd0c64a1762d24c8334000999859555cae345a7382d5819a6f923fd8cdf2fd8d4d2e68e863378c7576882cd6a568
-
SSDEEP
24576:V5Jv9AJdTyl4pf97WzwSsQniCbqr0RwquvqryHFdYTZ/V:V5JVAJYl4pFyzwB6t63SyHFu99
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/2084-192-0x00000000058E0000-0x0000000005A2D000-memory.dmp family_gh0strat behavioral2/memory/2084-191-0x00000000058E0000-0x0000000005A2D000-memory.dmp family_gh0strat -
Fatal Rat payload 12 IoCs
resource yara_rule behavioral2/memory/3196-146-0x00000000047F0000-0x000000000483D000-memory.dmp fatalrat behavioral2/memory/3196-168-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-174-0x0000000004E40000-0x0000000004E8D000-memory.dmp fatalrat behavioral2/memory/2084-183-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-184-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-185-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-186-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-187-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-193-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-194-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-195-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat behavioral2/memory/2084-196-0x0000000010000000-0x0000000010215000-memory.dmp fatalrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Agghost.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Agghost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Control Panel\International\Geo\Nation Agghost.exe -
Executes dropped EXE 2 IoCs
pid Process 3196 Agghost.exe 2084 Agghost.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Wine Agghost.exe Key opened \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Wine Agghost.exe -
Loads dropped DLL 3 IoCs
pid Process 3196 Agghost.exe 3196 Agghost.exe 2084 Agghost.exe -
resource yara_rule behavioral2/memory/2084-188-0x00000000058E0000-0x0000000005A2D000-memory.dmp upx behavioral2/memory/2084-192-0x00000000058E0000-0x0000000005A2D000-memory.dmp upx behavioral2/memory/2084-191-0x00000000058E0000-0x0000000005A2D000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3196 Agghost.exe 2084 Agghost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Agghost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Agghost.exe -
Modifies data under HKEY_USERS 15 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "87" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" LogonUI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3196 Agghost.exe 3196 Agghost.exe 3196 Agghost.exe 3196 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe 2084 Agghost.exe -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 3208 Process not Found 3784 Process not Found 3424 Process not Found 2840 Process not Found 816 Process not Found 4444 Process not Found 1632 Process not Found 1468 Process not Found 1152 Process not Found 1604 Process not Found 4596 Process not Found 560 Process not Found 3748 Process not Found 3004 Process not Found 3892 Process not Found 3364 Process not Found 4820 Process not Found 1640 Process not Found 4824 Process not Found 32 Process not Found 1980 Process not Found 4728 Process not Found 2004 Process not Found 3868 Process not Found 1868 Process not Found 4144 Process not Found 232 Process not Found 4104 Process not Found 4196 Process not Found 4100 Process not Found 4320 Process not Found 4700 Process not Found 1744 Process not Found 1944 Process not Found 5104 Process not Found 2768 Process not Found 4380 Process not Found 3952 Process not Found 496 Process not Found 4736 Process not Found 5116 Process not Found 3872 Process not Found 4400 Process not Found 4172 Process not Found 4332 Process not Found 3144 Process not Found 3652 Process not Found 2772 Process not Found 2112 Process not Found 4980 Process not Found 4460 Process not Found 4284 Process not Found 2564 Process not Found 5060 Process not Found 4796 Process not Found 4620 Process not Found 5052 Process not Found 2452 Process not Found 3000 Process not Found 3160 Process not Found 4792 Process not Found 2144 Process not Found 2728 Process not Found 3332 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3196 Agghost.exe Token: SeDebugPrivilege 2084 Agghost.exe Token: SeShutdownPrivilege 2084 Agghost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4244 LogonUI.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4144 wrote to memory of 3196 4144 5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe 84 PID 4144 wrote to memory of 3196 4144 5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe 84 PID 4144 wrote to memory of 3196 4144 5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe 84 PID 3196 wrote to memory of 2084 3196 Agghost.exe 85 PID 3196 wrote to memory of 2084 3196 Agghost.exe 85 PID 3196 wrote to memory of 2084 3196 Agghost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe"C:\Users\Admin\AppData\Local\Temp\5d3c3a309604356d25cc4bb23a8caeef2be23171a930817301a5f66d33fe8f42.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\data\Agghost.exeC:\Users\Admin\AppData\Local\Temp\data\Agghost.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Agghost.exe"C:\Users\Admin\AppData\Local\Agghost.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa39e5855 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:4244
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5a9b40e0b76aa5a292cb6052c6c2fd81d
SHA1e15bba9e662ef45350720218617d563620c76823
SHA256f5017d72f3b829a55971f877ebaa257f5e9791ae253ae23111cc45628477c36c
SHA512ad49410a233614128a103ae55155665f563b67daa7411c42bf314a6a6d1c2cb61e4428d9049d0d3209d44a1b5eef1cab00541b6bb41dcf575ff9e7e406a2f23f
-
Filesize
111KB
MD5a9b40e0b76aa5a292cb6052c6c2fd81d
SHA1e15bba9e662ef45350720218617d563620c76823
SHA256f5017d72f3b829a55971f877ebaa257f5e9791ae253ae23111cc45628477c36c
SHA512ad49410a233614128a103ae55155665f563b67daa7411c42bf314a6a6d1c2cb61e4428d9049d0d3209d44a1b5eef1cab00541b6bb41dcf575ff9e7e406a2f23f
-
Filesize
111KB
MD5a9b40e0b76aa5a292cb6052c6c2fd81d
SHA1e15bba9e662ef45350720218617d563620c76823
SHA256f5017d72f3b829a55971f877ebaa257f5e9791ae253ae23111cc45628477c36c
SHA512ad49410a233614128a103ae55155665f563b67daa7411c42bf314a6a6d1c2cb61e4428d9049d0d3209d44a1b5eef1cab00541b6bb41dcf575ff9e7e406a2f23f
-
Filesize
111KB
MD5a9b40e0b76aa5a292cb6052c6c2fd81d
SHA1e15bba9e662ef45350720218617d563620c76823
SHA256f5017d72f3b829a55971f877ebaa257f5e9791ae253ae23111cc45628477c36c
SHA512ad49410a233614128a103ae55155665f563b67daa7411c42bf314a6a6d1c2cb61e4428d9049d0d3209d44a1b5eef1cab00541b6bb41dcf575ff9e7e406a2f23f
-
Filesize
111KB
MD5a9b40e0b76aa5a292cb6052c6c2fd81d
SHA1e15bba9e662ef45350720218617d563620c76823
SHA256f5017d72f3b829a55971f877ebaa257f5e9791ae253ae23111cc45628477c36c
SHA512ad49410a233614128a103ae55155665f563b67daa7411c42bf314a6a6d1c2cb61e4428d9049d0d3209d44a1b5eef1cab00541b6bb41dcf575ff9e7e406a2f23f
-
Filesize
936KB
MD54683696a3518f9cd7c4ee730a53405c2
SHA123881246d838d9d2a1bd76430f9c5f7458e00e83
SHA25643e51c6becb9c635cce68d1aa32310ddd6ae68125ca2c00e5e47dc3536cb5fca
SHA5125bfc43d489b53585e7369e3d28daf9f501d6999517310249f88b158d268c2a4e730b8e10aec0959094f276e3b4ba79b5737add5dc01ef3d6136e42a04552522c
-
Filesize
936KB
MD54683696a3518f9cd7c4ee730a53405c2
SHA123881246d838d9d2a1bd76430f9c5f7458e00e83
SHA25643e51c6becb9c635cce68d1aa32310ddd6ae68125ca2c00e5e47dc3536cb5fca
SHA5125bfc43d489b53585e7369e3d28daf9f501d6999517310249f88b158d268c2a4e730b8e10aec0959094f276e3b4ba79b5737add5dc01ef3d6136e42a04552522c
-
Filesize
936KB
MD54683696a3518f9cd7c4ee730a53405c2
SHA123881246d838d9d2a1bd76430f9c5f7458e00e83
SHA25643e51c6becb9c635cce68d1aa32310ddd6ae68125ca2c00e5e47dc3536cb5fca
SHA5125bfc43d489b53585e7369e3d28daf9f501d6999517310249f88b158d268c2a4e730b8e10aec0959094f276e3b4ba79b5737add5dc01ef3d6136e42a04552522c
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530
-
Filesize
77KB
MD5f107a3c7371c4543bd3908ba729dd2db
SHA1af8e7e8f446de74db2f31d532e46eab8bbf41e0a
SHA25600df0901c101254525a219d93ff1830da3a20d3f14bc323354d8d5fee5854ec0
SHA512fd776f8ceaac498f4f44819794c0fa89224712a8c476819ffc76ba4c7ff4caa9b360b9d299d9df7965387e5bbcb330f316f53759b5146a73b27a5f2e964c3530