Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
22/09/2023, 05:39 UTC
Static task
static1
Behavioral task
behavioral1
Sample
e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe
Resource
win7-20230831-en
General
-
Target
e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe
-
Size
1.1MB
-
MD5
81063a6ec8fc6b35a92d03c335b61cad
-
SHA1
a7f5173a6c5774e5c4be66f6e5496aa86fc6ec87
-
SHA256
e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7
-
SHA512
62964c54bc063f8bc351f7372add1d8f7a2f38b49c6d4a6ce07739a634ae355c9a43dd43810271919dcbfa2f99964050784250108332d1b59595a597a54e55f5
-
SSDEEP
24576:psRkWF5Vi5Fu5xfSejKWaxRc0Ou1R1DSR0EA1RIkE7cLyll5:yRk+5kwvQIu1R10A1ukEFV
Malware Config
Extracted
gh0strat
192.253.237.97
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4672-13079-0x0000000010000000-0x0000000010030000-memory.dmp family_gh0strat behavioral2/memory/4672-13090-0x0000000000400000-0x000000000056B000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 3176 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7mgr.exe -
resource yara_rule behavioral2/files/0x000700000002324f-13087.dat upx behavioral2/memory/3176-13086-0x0000000000400000-0x000000000045B000-memory.dmp upx behavioral2/files/0x000700000002324f-13085.dat upx behavioral2/memory/3176-13089-0x0000000000400000-0x000000000045B000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2344 3176 WerFault.exe 85 -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4672 wrote to memory of 3176 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 85 PID 4672 wrote to memory of 3176 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 85 PID 4672 wrote to memory of 3176 4672 e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe"C:\Users\Admin\AppData\Local\Temp\e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7mgr.exeC:\Users\Admin\AppData\Local\Temp\e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7mgr.exe2⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 2643⤵
- Program crash
PID:2344
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3176 -ip 31761⤵PID:1176
Network
-
Remote address:8.8.8.8:53Request0.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request205.47.74.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request183.59.114.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request171.39.242.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request1.202.248.87.in-addr.arpaIN PTRResponse1.202.248.87.in-addr.arpaIN PTRhttps-87-248-202-1amsllnwnet
-
Remote address:8.8.8.8:53Request11.227.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request18.173.189.20.in-addr.arpaIN PTRResponse
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 200 B 5 5
-
260 B 160 B 5 4
-
71 B 157 B 1 1
DNS Request
0.159.190.20.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
205.47.74.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
183.59.114.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
171.39.242.20.in-addr.arpa
-
71 B 116 B 1 1
DNS Request
1.202.248.87.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
11.227.111.52.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
18.173.189.20.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7mgr.exe
Filesize105KB
MD5dfb5daabb95dcfad1a5faf9ab1437076
SHA14a199569a9b52911bee7fb19ab80570cc5ff9ed1
SHA25654282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0
SHA5125d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8
-
C:\Users\Admin\AppData\Local\Temp\e76c24926275e4aa90876c29d1ed64781146b2df00ffe660f3152da8c06c0cb7mgr.exe
Filesize105KB
MD5dfb5daabb95dcfad1a5faf9ab1437076
SHA14a199569a9b52911bee7fb19ab80570cc5ff9ed1
SHA25654282ec29d4993ed6e9972122cfbb70bba4898a21d527bd9e72a166d7ec2fdc0
SHA5125d31c34403ab5f8db4a6d84f2b5579d4ea18673914b626d78e458a648ac20ddd8e342818e807331036d7bb064f596a02b9737acac42fbead29260343a30717e8