Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
02/06/2023, 08:05
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
General
-
Target
tmp.exe
-
Size
188KB
-
MD5
1f3eff47818b6c31bf220154c0fdee12
-
SHA1
26772f42ff36dc47e4aed1f7bbb4b0e331978410
-
SHA256
bff74dc434e208598c2ba484341c6275eaeaa87992043f936e8915bde97b94a2
-
SHA512
8d49c5a8e8885a359732bfef5805f57e981aa16a624756f0c37287ef2a5ecd7b9932633c217e9f3bdb1d317317a6118cfced97afe268a7f72272f08726c5ac12
-
SSDEEP
3072:IWTDNVSbckR+z7uHVuoHsvmhtfwrHY52Lr0l7STUyg5f0oDAAt02un3:nvSbckA2VuisvmPOzptg5BA5p3
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1504-55-0x0000000010000000-0x000000001001E000-memory.dmp family_gh0strat behavioral1/memory/1504-54-0x0000000006A70000-0x0000000006ABE000-memory.dmp family_gh0strat -
Modifies RDP port number used by Windows 1 TTPs
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 tmp.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz tmp.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 796 vlc.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe 1504 tmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 796 vlc.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 1976 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1976 AUDIODG.EXE Token: 33 1976 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1976 AUDIODG.EXE Token: 33 796 vlc.exe Token: SeIncBasePriorityPrivilege 796 vlc.exe -
Suspicious use of FindShellTrayWindow 28 IoCs
pid Process 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe 796 vlc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1504 tmp.exe 796 vlc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1504 wrote to memory of 796 1504 tmp.exe 29 PID 1504 wrote to memory of 796 1504 tmp.exe 29 PID 1504 wrote to memory of 796 1504 tmp.exe 29 PID 1504 wrote to memory of 796 1504 tmp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file c:\IMG_0050.MOV2⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:796
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0xc81⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.4MB
MD565b738f038962f076c94dee1f8b7db92
SHA141196bd05f89582c812e551dcde3ba6221e99c63
SHA256628790c3dcd300d5934193a09323986a585bf60f8b8f9561812ce1977c6ce12c
SHA5123bb978b6030c5d2c1d8303696cfbdb0c70230082876c804cd996a75faabb4cb8c58eeb7ab186df9bae8f396d5f59d45a4b33614c6b74f62827df082e9d5df5d3