Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2023, 19:24

General

  • Target

    bd919e1f8b83a02e64622a5f6a583067d661647eb346f6bf89b4add64c061d75.exe

  • Size

    180KB

  • MD5

    68e99b7e1804de0056b87b810faf896e

  • SHA1

    78b4f323eadd796bc85610926308db82ff1c24b1

  • SHA256

    bd919e1f8b83a02e64622a5f6a583067d661647eb346f6bf89b4add64c061d75

  • SHA512

    ecbf85b332c4b9971e0dd45fafda63b467b4790b204cc6c16887f7fc4a65f89160df4f3bc72baee078f9139c9ccbea0e15ee3a555df58b4408cf85adeef56b5d

  • SSDEEP

    3072:LwI2iWTWP6M1DA57yZU6OnJLMML7grZmvl8EumtZmvl8EHHdY:L4iPCMqMZ0JQMninW

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Downloads MZ/PE file
  • Modifies RDP port number used by Windows 1 TTPs
  • Executes dropped EXE 2 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 24 IoCs
  • Suspicious use of SendNotifyMessage 7 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd919e1f8b83a02e64622a5f6a583067d661647eb346f6bf89b4add64c061d75.exe
    "C:\Users\Admin\AppData\Local\Temp\bd919e1f8b83a02e64622a5f6a583067d661647eb346f6bf89b4add64c061d75.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4616
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\Users\Public\LZS\meproaz.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Users\Public\LZS\meproaz.exe
        C:\Users\Public\LZS\meproaz.exe
        3⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1084
        • C:\Program Files\VideoLAN\VLC\vlc.exe
          "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file c:\IMG_0050.MOV
          4⤵
          • Suspicious behavior: AddClipboardFormatListener
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          PID:912
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c start C:\Users\Public\LZS\Time.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Public\LZS\Time.exe
        C:\Users\Public\LZS\Time.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2052
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x33c 0x4fc
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:3848

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\LZS\Time.exe

    Filesize

    212KB

    MD5

    f98b74dee1bf916aa4575d78c7b4366c

    SHA1

    f136bcae6475bfd247762549bf428b12f251bc13

    SHA256

    4c12bb625c4c1c1c7684588e7838f59836f6e8009d932b099e90e1a7e98c0901

    SHA512

    ea626e850cfd95866abf812f9ae6fd2fa541483e905b3ec6d93e6d78c31d70a0c91a761a0e637cb2652667573ac3c7928ecd5eabab0f21e81e70e5a9f7aab227

  • C:\Users\Public\LZS\Time.exe

    Filesize

    212KB

    MD5

    f98b74dee1bf916aa4575d78c7b4366c

    SHA1

    f136bcae6475bfd247762549bf428b12f251bc13

    SHA256

    4c12bb625c4c1c1c7684588e7838f59836f6e8009d932b099e90e1a7e98c0901

    SHA512

    ea626e850cfd95866abf812f9ae6fd2fa541483e905b3ec6d93e6d78c31d70a0c91a761a0e637cb2652667573ac3c7928ecd5eabab0f21e81e70e5a9f7aab227

  • C:\Users\Public\LZS\meproaz.exe

    Filesize

    188KB

    MD5

    d0dad509d06c0f7e49cea090a4b4935e

    SHA1

    b5f598ff0c5148619bce9a96d62be7fc98ec6148

    SHA256

    406ca3b5767a2fb3cacea058561b313c662206157514f07d147b31ab1b8f025d

    SHA512

    9905b16482664d2675803868280b6dd08d3d13c43789718bfde3d194bc5a6f252c19e3c0f7a7b394cf30f71d38c3f16ea55202dee45c005a32233e5a269b3846

  • C:\Users\Public\LZS\meproaz.exe

    Filesize

    188KB

    MD5

    d0dad509d06c0f7e49cea090a4b4935e

    SHA1

    b5f598ff0c5148619bce9a96d62be7fc98ec6148

    SHA256

    406ca3b5767a2fb3cacea058561b313c662206157514f07d147b31ab1b8f025d

    SHA512

    9905b16482664d2675803868280b6dd08d3d13c43789718bfde3d194bc5a6f252c19e3c0f7a7b394cf30f71d38c3f16ea55202dee45c005a32233e5a269b3846

  • \??\c:\IMG_0050.MOV

    Filesize

    2.4MB

    MD5

    65b738f038962f076c94dee1f8b7db92

    SHA1

    41196bd05f89582c812e551dcde3ba6221e99c63

    SHA256

    628790c3dcd300d5934193a09323986a585bf60f8b8f9561812ce1977c6ce12c

    SHA512

    3bb978b6030c5d2c1d8303696cfbdb0c70230082876c804cd996a75faabb4cb8c58eeb7ab186df9bae8f396d5f59d45a4b33614c6b74f62827df082e9d5df5d3

  • memory/912-166-0x00007FFDAD440000-0x00007FFDAD474000-memory.dmp

    Filesize

    208KB

  • memory/912-165-0x00007FF7ECE10000-0x00007FF7ECF08000-memory.dmp

    Filesize

    992KB

  • memory/912-167-0x00007FFDABF80000-0x00007FFDAC234000-memory.dmp

    Filesize

    2.7MB

  • memory/912-174-0x00007FFDABF40000-0x00007FFDABF51000-memory.dmp

    Filesize

    68KB

  • memory/912-173-0x00007FFDABF60000-0x00007FFDABF7D000-memory.dmp

    Filesize

    116KB

  • memory/912-172-0x00007FFDAC7E0000-0x00007FFDAC7F1000-memory.dmp

    Filesize

    68KB

  • memory/912-176-0x00007FFDABD00000-0x00007FFDABD3F000-memory.dmp

    Filesize

    252KB

  • memory/912-175-0x00007FFDABD40000-0x00007FFDABF40000-memory.dmp

    Filesize

    2.0MB

  • memory/912-177-0x00007FFDABCD0000-0x00007FFDABCF1000-memory.dmp

    Filesize

    132KB

  • memory/912-171-0x00007FFDAC800000-0x00007FFDAC817000-memory.dmp

    Filesize

    92KB

  • memory/912-170-0x00007FFDAC820000-0x00007FFDAC831000-memory.dmp

    Filesize

    68KB

  • memory/912-169-0x00007FFDAC840000-0x00007FFDAC857000-memory.dmp

    Filesize

    92KB

  • memory/912-168-0x00007FFDBC250000-0x00007FFDBC268000-memory.dmp

    Filesize

    96KB

  • memory/912-178-0x00007FFDAAC20000-0x00007FFDABCCB000-memory.dmp

    Filesize

    16.7MB

  • memory/912-179-0x00007FFDAAC00000-0x00007FFDAAC18000-memory.dmp

    Filesize

    96KB

  • memory/912-180-0x00007FFDAABE0000-0x00007FFDAABF1000-memory.dmp

    Filesize

    68KB

  • memory/912-181-0x00007FFDAABC0000-0x00007FFDAABD1000-memory.dmp

    Filesize

    68KB

  • memory/912-182-0x00007FFDAABA0000-0x00007FFDAABB1000-memory.dmp

    Filesize

    68KB

  • memory/912-186-0x00007FFDAAB10000-0x00007FFDAAB40000-memory.dmp

    Filesize

    192KB

  • memory/912-185-0x00007FFDAAB40000-0x00007FFDAAB58000-memory.dmp

    Filesize

    96KB

  • memory/912-187-0x00007FFDAAAA0000-0x00007FFDAAB07000-memory.dmp

    Filesize

    412KB

  • memory/912-189-0x00007FFDAAA10000-0x00007FFDAAA21000-memory.dmp

    Filesize

    68KB

  • memory/912-191-0x00007FFDAA830000-0x00007FFDAA9A8000-memory.dmp

    Filesize

    1.5MB

  • memory/912-197-0x00007FFDAA470000-0x00007FFDAA5DB000-memory.dmp

    Filesize

    1.4MB

  • memory/912-194-0x00007FFDAA680000-0x00007FFDAA692000-memory.dmp

    Filesize

    72KB

  • memory/912-199-0x00007FFDAA1C0000-0x00007FFDAA40B000-memory.dmp

    Filesize

    2.3MB

  • memory/912-198-0x00007FFDAA410000-0x00007FFDAA467000-memory.dmp

    Filesize

    348KB

  • memory/912-193-0x00007FFDAA6A0000-0x00007FFDAA810000-memory.dmp

    Filesize

    1.4MB

  • memory/912-195-0x00007FFDAA630000-0x00007FFDAA672000-memory.dmp

    Filesize

    264KB

  • memory/912-196-0x00007FFDAA5E0000-0x00007FFDAA62C000-memory.dmp

    Filesize

    304KB

  • memory/912-192-0x00007FFDAA810000-0x00007FFDAA827000-memory.dmp

    Filesize

    92KB

  • memory/912-188-0x00007FFDAAA30000-0x00007FFDAAA9F000-memory.dmp

    Filesize

    444KB

  • memory/912-190-0x00007FFDAA9B0000-0x00007FFDAAA06000-memory.dmp

    Filesize

    344KB

  • memory/912-184-0x00007FFDAAB60000-0x00007FFDAAB71000-memory.dmp

    Filesize

    68KB

  • memory/912-183-0x00007FFDAAB80000-0x00007FFDAAB9B000-memory.dmp

    Filesize

    108KB

  • memory/912-200-0x00007FFDA8A10000-0x00007FFDAA1C0000-memory.dmp

    Filesize

    23.7MB

  • memory/912-201-0x00007FFDBB8E0000-0x00007FFDBB8F0000-memory.dmp

    Filesize

    64KB

  • memory/912-203-0x00007FFDA89C0000-0x00007FFDA89D1000-memory.dmp

    Filesize

    68KB

  • memory/912-204-0x00007FFDA89A0000-0x00007FFDA89B6000-memory.dmp

    Filesize

    88KB

  • memory/912-206-0x00007FFDA8850000-0x00007FFDA88C5000-memory.dmp

    Filesize

    468KB

  • memory/912-205-0x00007FFDA88D0000-0x00007FFDA8995000-memory.dmp

    Filesize

    788KB

  • memory/912-208-0x00007FFDA8770000-0x00007FFDA87DD000-memory.dmp

    Filesize

    436KB

  • memory/912-209-0x00007FFDA8750000-0x00007FFDA8763000-memory.dmp

    Filesize

    76KB

  • memory/912-210-0x00007FFDA8730000-0x00007FFDA8744000-memory.dmp

    Filesize

    80KB

  • memory/912-211-0x00007FFDA86E0000-0x00007FFDA8730000-memory.dmp

    Filesize

    320KB

  • memory/912-212-0x00007FFDA86C0000-0x00007FFDA86D5000-memory.dmp

    Filesize

    84KB

  • memory/912-207-0x00007FFDA87E0000-0x00007FFDA8842000-memory.dmp

    Filesize

    392KB

  • memory/912-214-0x00007FFDA77B0000-0x00007FFDA77C1000-memory.dmp

    Filesize

    68KB

  • memory/912-218-0x00007FFDA7560000-0x00007FFDA76DA000-memory.dmp

    Filesize

    1.5MB

  • memory/912-217-0x00007FFDA76E0000-0x00007FFDA7703000-memory.dmp

    Filesize

    140KB

  • memory/912-219-0x00007FFDA7540000-0x00007FFDA7553000-memory.dmp

    Filesize

    76KB

  • memory/912-216-0x00007FFDA7710000-0x00007FFDA7725000-memory.dmp

    Filesize

    84KB

  • memory/912-215-0x00007FFDA7790000-0x00007FFDA77A2000-memory.dmp

    Filesize

    72KB

  • memory/912-220-0x00007FFDA7440000-0x00007FFDA7534000-memory.dmp

    Filesize

    976KB

  • memory/912-223-0x00007FFDA73D0000-0x00007FFDA73EB000-memory.dmp

    Filesize

    108KB

  • memory/912-224-0x00007FFDA73B0000-0x00007FFDA73C2000-memory.dmp

    Filesize

    72KB

  • memory/912-222-0x00007FFDA73F0000-0x00007FFDA7403000-memory.dmp

    Filesize

    76KB

  • memory/912-221-0x00007FFDA7410000-0x00007FFDA743A000-memory.dmp

    Filesize

    168KB

  • memory/912-213-0x00007FFDA84A0000-0x00007FFDA86BD000-memory.dmp

    Filesize

    2.1MB

  • memory/912-202-0x00007FFDA89E0000-0x00007FFDA8A0F000-memory.dmp

    Filesize

    188KB

  • memory/1084-147-0x0000000008FD0000-0x000000000901E000-memory.dmp

    Filesize

    312KB

  • memory/1084-148-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB