Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
75s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 08:03
Behavioral task
behavioral1
Sample
新建文件夹 (2)/_D0DE469BB8424834A796EDFE1D0176CA.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
新建文件夹 (2)/_D0DE469BB8424834A796EDFE1D0176CA.exe
Resource
win10v2004-20230621-en
Behavioral task
behavioral3
Sample
新建文件夹 (2)/f49acfb27630f8962eb2fe80da75b3e09f4b3d69c8d3c316687200a1c8aa1f4f.msi
Resource
win7-20230621-en
Behavioral task
behavioral4
Sample
新建文件夹 (2)/f49acfb27630f8962eb2fe80da75b3e09f4b3d69c8d3c316687200a1c8aa1f4f.msi
Resource
win10v2004-20230621-en
Behavioral task
behavioral5
Sample
新建文件夹 (2)/新建文件夹/Agghosts.exe
Resource
win7-20230621-en
Behavioral task
behavioral6
Sample
新建文件夹 (2)/新建文件夹/Agghosts.exe
Resource
win10v2004-20230621-en
General
-
Target
新建文件夹 (2)/新建文件夹/Agghosts.exe
-
Size
29KB
-
MD5
614ceaa6ab7f39714e24e9e6b7b0c7b4
-
SHA1
83b63819fe9a9b8c1624e9969fe125088a873cdc
-
SHA256
e46b0297c7cf534ce46bc673062ed903d11b574fb0602c3bb1a30eb4bbf6f05f
-
SHA512
406bc2d2602d0b18e41148c211ceeb65580402046b205ae5e2a65421d02e2fb1ffc4fee76fb803b9e3f7b00081375a36b6b9162729ea447a7f10997716529483
-
SSDEEP
768:CIl97bHB8CCzEVz1Btnb1WYiRSoQu1xPij97h:xl977KCUUhnbY7RL71x6j9N
Malware Config
Signatures
-
FatalRat
FatalRat is a modular infostealer family written in C++ first appearing in June 2021.
-
Fatal Rat payload 2 IoCs
resource yara_rule behavioral6/memory/4732-133-0x0000000000D70000-0x0000000000D95000-memory.dmp fatalrat behavioral6/memory/4732-134-0x0000000010000000-0x000000001001D000-memory.dmp fatalrat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Çý¶¯ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\????? (2)\\?????\\Agghosts.exe" Agghosts.exe Set value (str) \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Çý¶¯ = "C:\\Users\\Admin\\AppData\\Local\\Agghosts.exe" Agghosts.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2178924671-3779044592-2825503497-1000\Control Panel\International\Geo\Nation Agghosts.exe -
Executes dropped EXE 1 IoCs
pid Process 1752 Agghosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4732 Agghosts.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4732 wrote to memory of 1752 4732 Agghosts.exe 84 PID 4732 wrote to memory of 1752 4732 Agghosts.exe 84 PID 4732 wrote to memory of 1752 4732 Agghosts.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\新建文件夹 (2)\新建文件夹\Agghosts.exe"C:\Users\Admin\AppData\Local\Temp\新建文件夹 (2)\新建文件夹\Agghosts.exe"1⤵
- Adds Run key to start application
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Agghosts.exe"C:\Users\Admin\AppData\Local\Agghosts.exe"2⤵
- Adds Run key to start application
- Executes dropped EXE
PID:1752
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
29KB
MD5614ceaa6ab7f39714e24e9e6b7b0c7b4
SHA183b63819fe9a9b8c1624e9969fe125088a873cdc
SHA256e46b0297c7cf534ce46bc673062ed903d11b574fb0602c3bb1a30eb4bbf6f05f
SHA512406bc2d2602d0b18e41148c211ceeb65580402046b205ae5e2a65421d02e2fb1ffc4fee76fb803b9e3f7b00081375a36b6b9162729ea447a7f10997716529483
-
Filesize
29KB
MD5614ceaa6ab7f39714e24e9e6b7b0c7b4
SHA183b63819fe9a9b8c1624e9969fe125088a873cdc
SHA256e46b0297c7cf534ce46bc673062ed903d11b574fb0602c3bb1a30eb4bbf6f05f
SHA512406bc2d2602d0b18e41148c211ceeb65580402046b205ae5e2a65421d02e2fb1ffc4fee76fb803b9e3f7b00081375a36b6b9162729ea447a7f10997716529483
-
Filesize
29KB
MD5614ceaa6ab7f39714e24e9e6b7b0c7b4
SHA183b63819fe9a9b8c1624e9969fe125088a873cdc
SHA256e46b0297c7cf534ce46bc673062ed903d11b574fb0602c3bb1a30eb4bbf6f05f
SHA512406bc2d2602d0b18e41148c211ceeb65580402046b205ae5e2a65421d02e2fb1ffc4fee76fb803b9e3f7b00081375a36b6b9162729ea447a7f10997716529483