Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    117s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    22/09/2023, 19:02

General

  • Target

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

  • Size

    528KB

  • MD5

    becd95aa413ca13ab1d16ca2a2624265

  • SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

  • SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

  • SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • SSDEEP

    12288:F8vZ88x97XB5snEX2JkFx3qwBSA8wWApEvOPJGdRxbdHo31:FSZ9nbsEUkr3FBIwWApEvOPJGdRxbdHu

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Fatal Rat payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 59 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe
    "C:\Users\Admin\AppData\Local\Temp\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2012
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2628
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1044
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell -Command -
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2520
    • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe
      "C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe"
      2⤵
      • Executes dropped EXE
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1656
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:584

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • C:\Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\1R91LJ8RZ1FL2I2LYPA6.temp

    Filesize

    7KB

    MD5

    9d8e11f96c5a7fe4dd2f749be77bbcb1

    SHA1

    2c7cfc545d2cf544a4d23278ca85f5dda7ad9ec7

    SHA256

    3b3125c56e584086fac0fbb1dce8e4a2da891883827625c818ba375a1c51dac6

    SHA512

    8ac694f00b68f5d066921b313f3b6c21afcf0b52cba1d860fbf0c9bca59ce13e545aa648b0f9bb5c185c624e36ad61540fa5141eb38b9e8f686bd93d7184e23a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    b9931c07bedd7bdbf71eb54424bea07c

    SHA1

    e8e7659b94963bbf81d62ec9f24c0f2b99b41a4d

    SHA256

    c2dc616b47c8a9ca78b9788689d7e88b02b07594997d168ac8b69d8a06c63474

    SHA512

    eafcea089d87463af8f72a110fc65d1fca3c446f11dbdd7c3c989906213ff725c096b2b97bac2e7a5136d4cc10b6f8849315b8fa3b9daba2dd2563ec0b5a6ca1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    b9931c07bedd7bdbf71eb54424bea07c

    SHA1

    e8e7659b94963bbf81d62ec9f24c0f2b99b41a4d

    SHA256

    c2dc616b47c8a9ca78b9788689d7e88b02b07594997d168ac8b69d8a06c63474

    SHA512

    eafcea089d87463af8f72a110fc65d1fca3c446f11dbdd7c3c989906213ff725c096b2b97bac2e7a5136d4cc10b6f8849315b8fa3b9daba2dd2563ec0b5a6ca1

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    9d8e11f96c5a7fe4dd2f749be77bbcb1

    SHA1

    2c7cfc545d2cf544a4d23278ca85f5dda7ad9ec7

    SHA256

    3b3125c56e584086fac0fbb1dce8e4a2da891883827625c818ba375a1c51dac6

    SHA512

    8ac694f00b68f5d066921b313f3b6c21afcf0b52cba1d860fbf0c9bca59ce13e545aa648b0f9bb5c185c624e36ad61540fa5141eb38b9e8f686bd93d7184e23a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    9d8e11f96c5a7fe4dd2f749be77bbcb1

    SHA1

    2c7cfc545d2cf544a4d23278ca85f5dda7ad9ec7

    SHA256

    3b3125c56e584086fac0fbb1dce8e4a2da891883827625c818ba375a1c51dac6

    SHA512

    8ac694f00b68f5d066921b313f3b6c21afcf0b52cba1d860fbf0c9bca59ce13e545aa648b0f9bb5c185c624e36ad61540fa5141eb38b9e8f686bd93d7184e23a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    9d8e11f96c5a7fe4dd2f749be77bbcb1

    SHA1

    2c7cfc545d2cf544a4d23278ca85f5dda7ad9ec7

    SHA256

    3b3125c56e584086fac0fbb1dce8e4a2da891883827625c818ba375a1c51dac6

    SHA512

    8ac694f00b68f5d066921b313f3b6c21afcf0b52cba1d860fbf0c9bca59ce13e545aa648b0f9bb5c185c624e36ad61540fa5141eb38b9e8f686bd93d7184e23a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    9d8e11f96c5a7fe4dd2f749be77bbcb1

    SHA1

    2c7cfc545d2cf544a4d23278ca85f5dda7ad9ec7

    SHA256

    3b3125c56e584086fac0fbb1dce8e4a2da891883827625c818ba375a1c51dac6

    SHA512

    8ac694f00b68f5d066921b313f3b6c21afcf0b52cba1d860fbf0c9bca59ce13e545aa648b0f9bb5c185c624e36ad61540fa5141eb38b9e8f686bd93d7184e23a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

    Filesize

    7KB

    MD5

    b9931c07bedd7bdbf71eb54424bea07c

    SHA1

    e8e7659b94963bbf81d62ec9f24c0f2b99b41a4d

    SHA256

    c2dc616b47c8a9ca78b9788689d7e88b02b07594997d168ac8b69d8a06c63474

    SHA512

    eafcea089d87463af8f72a110fc65d1fca3c446f11dbdd7c3c989906213ff725c096b2b97bac2e7a5136d4cc10b6f8849315b8fa3b9daba2dd2563ec0b5a6ca1

  • C:\Users\Default\Desktop\athletes.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • \Users\Admin\AppData\Local\c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860.exe

    Filesize

    528KB

    MD5

    becd95aa413ca13ab1d16ca2a2624265

    SHA1

    b952bed06d54f210d7e4efa38ec41845f4565af5

    SHA256

    c6aac0b9688ba5c0870da940586fc490c162beaa73f43d9fee6d4b4655bcf860

    SHA512

    450b7ce0561295aaef07b724c78ad9da80995d7c59323a18d92d4f5a185c581527713787bcee61f169cd78b0977284fece2bb16794c4f3d78d874dd82c22b6c5

  • memory/584-98-0x0000000073E90000-0x000000007443B000-memory.dmp

    Filesize

    5.7MB

  • memory/584-96-0x0000000073E90000-0x000000007443B000-memory.dmp

    Filesize

    5.7MB

  • memory/584-97-0x0000000073E90000-0x000000007443B000-memory.dmp

    Filesize

    5.7MB

  • memory/1044-29-0x0000000073E90000-0x000000007443B000-memory.dmp

    Filesize

    5.7MB

  • memory/1044-26-0x0000000073E90000-0x000000007443B000-memory.dmp

    Filesize

    5.7MB

  • memory/1044-32-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1044-31-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1044-30-0x0000000073E90000-0x000000007443B000-memory.dmp

    Filesize

    5.7MB

  • memory/1044-27-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1044-28-0x0000000002840000-0x0000000002880000-memory.dmp

    Filesize

    256KB

  • memory/1288-76-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/1288-74-0x0000000073AF0000-0x000000007409B000-memory.dmp

    Filesize

    5.7MB

  • memory/1288-72-0x0000000073AF0000-0x000000007409B000-memory.dmp

    Filesize

    5.7MB

  • memory/1288-73-0x00000000026A0000-0x00000000026E0000-memory.dmp

    Filesize

    256KB

  • memory/1288-75-0x0000000073AF0000-0x000000007409B000-memory.dmp

    Filesize

    5.7MB

  • memory/1436-41-0x0000000002490000-0x0000000002590000-memory.dmp

    Filesize

    1024KB

  • memory/1436-42-0x0000000002490000-0x0000000002590000-memory.dmp

    Filesize

    1024KB

  • memory/1436-43-0x0000000002490000-0x0000000002590000-memory.dmp

    Filesize

    1024KB

  • memory/1436-44-0x0000000010000000-0x0000000010042000-memory.dmp

    Filesize

    264KB

  • memory/1472-102-0x0000000010000000-0x0000000010042000-memory.dmp

    Filesize

    264KB

  • memory/1472-108-0x00000000028D0000-0x00000000029D0000-memory.dmp

    Filesize

    1024KB

  • memory/1472-100-0x00000000028D0000-0x00000000029D0000-memory.dmp

    Filesize

    1024KB

  • memory/1472-101-0x00000000028D0000-0x00000000029D0000-memory.dmp

    Filesize

    1024KB

  • memory/1472-99-0x00000000028D0000-0x00000000029D0000-memory.dmp

    Filesize

    1024KB

  • memory/1656-63-0x0000000073A40000-0x0000000073FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1656-64-0x0000000073A40000-0x0000000073FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1656-65-0x00000000025B0000-0x00000000025F0000-memory.dmp

    Filesize

    256KB

  • memory/1656-66-0x0000000073A40000-0x0000000073FEB000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-86-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/1804-89-0x0000000073A30000-0x0000000073FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-88-0x0000000073A30000-0x0000000073FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/1804-87-0x0000000002590000-0x00000000025D0000-memory.dmp

    Filesize

    256KB

  • memory/1804-85-0x0000000073A30000-0x0000000073FDB000-memory.dmp

    Filesize

    5.7MB

  • memory/2012-7-0x0000000002510000-0x0000000002550000-memory.dmp

    Filesize

    256KB

  • memory/2012-8-0x0000000002510000-0x0000000002550000-memory.dmp

    Filesize

    256KB

  • memory/2012-4-0x0000000002510000-0x0000000002550000-memory.dmp

    Filesize

    256KB

  • memory/2012-6-0x0000000073A60000-0x000000007400B000-memory.dmp

    Filesize

    5.7MB

  • memory/2012-5-0x0000000002510000-0x0000000002550000-memory.dmp

    Filesize

    256KB

  • memory/2012-3-0x0000000073A60000-0x000000007400B000-memory.dmp

    Filesize

    5.7MB

  • memory/2012-2-0x0000000073A60000-0x000000007400B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-38-0x00000000731D0000-0x000000007377B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-39-0x00000000731D0000-0x000000007377B000-memory.dmp

    Filesize

    5.7MB

  • memory/2520-40-0x00000000731D0000-0x000000007377B000-memory.dmp

    Filesize

    5.7MB

  • memory/2628-16-0x0000000002740000-0x0000000002780000-memory.dmp

    Filesize

    256KB

  • memory/2628-14-0x0000000073E70000-0x000000007441B000-memory.dmp

    Filesize

    5.7MB

  • memory/2628-15-0x0000000073E70000-0x000000007441B000-memory.dmp

    Filesize

    5.7MB

  • memory/2628-18-0x0000000002740000-0x0000000002780000-memory.dmp

    Filesize

    256KB

  • memory/2628-17-0x0000000073E70000-0x000000007441B000-memory.dmp

    Filesize

    5.7MB