Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/10/2023, 14:56
Behavioral task
behavioral1
Sample
NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe
-
Size
10.1MB
-
MD5
0afb464d2654193dac667c26a24afbd0
-
SHA1
cc52ed0e0caba7a3dab7b40f4d06605205d8a9df
-
SHA256
8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4
-
SHA512
2290595bb7bc96b7d46ccce660c808bf58d18802e82f89407e6887d030e66ebe636c35fe917aed1c95f74387aab7c0f4a449f17749a8e58b8066b28c38ac4e5d
-
SSDEEP
6144:1IposGo+OMpe4HMHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHf:SpodaMo4Y
Malware Config
Extracted
gh0strat
127.0.0.1
Signatures
-
Gh0st RAT payload 5 IoCs
resource yara_rule behavioral1/memory/2264-1-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/2588-10-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/2588-17-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat behavioral1/memory/2712-21-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat behavioral1/memory/2264-22-0x0000000000400000-0x0000000000465000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2588 360 automatic update.bat 2712 360 automatic update.bat -
Loads dropped DLL 1 IoCs
pid Process 2588 360 automatic update.bat -
resource yara_rule behavioral1/memory/2264-0-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/files/0x00060000000120e4-8.dat upx behavioral1/files/0x00060000000120e4-9.dat upx behavioral1/files/0x00060000000120e4-13.dat upx behavioral1/memory/2712-16-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/files/0x00060000000120e4-15.dat upx behavioral1/memory/2588-17-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2712-21-0x0000000000400000-0x0000000000465000-memory.dmp upx behavioral1/memory/2264-22-0x0000000000400000-0x0000000000465000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\360 automatic update.bat NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe File created C:\Windows\SysWOW64\360 automatic update.bat NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2264 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2264 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2264 NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe 2588 360 automatic update.bat 2588 360 automatic update.bat 2588 360 automatic update.bat 2712 360 automatic update.bat 2712 360 automatic update.bat 2712 360 automatic update.bat -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29 PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29 PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29 PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29 PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29 PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29 PID 2588 wrote to memory of 2712 2588 360 automatic update.bat 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.8dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4_JC.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2264
-
C:\Windows\SysWOW64\360 automatic update.bat"C:\Windows\SysWOW64\360 automatic update.bat"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\360 automatic update.bat"C:\Windows\SysWOW64\360 automatic update.bat" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10.1MB
MD50afb464d2654193dac667c26a24afbd0
SHA1cc52ed0e0caba7a3dab7b40f4d06605205d8a9df
SHA2568dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4
SHA5122290595bb7bc96b7d46ccce660c808bf58d18802e82f89407e6887d030e66ebe636c35fe917aed1c95f74387aab7c0f4a449f17749a8e58b8066b28c38ac4e5d
-
Filesize
10.1MB
MD50afb464d2654193dac667c26a24afbd0
SHA1cc52ed0e0caba7a3dab7b40f4d06605205d8a9df
SHA2568dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4
SHA5122290595bb7bc96b7d46ccce660c808bf58d18802e82f89407e6887d030e66ebe636c35fe917aed1c95f74387aab7c0f4a449f17749a8e58b8066b28c38ac4e5d
-
Filesize
10.1MB
MD50afb464d2654193dac667c26a24afbd0
SHA1cc52ed0e0caba7a3dab7b40f4d06605205d8a9df
SHA2568dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4
SHA5122290595bb7bc96b7d46ccce660c808bf58d18802e82f89407e6887d030e66ebe636c35fe917aed1c95f74387aab7c0f4a449f17749a8e58b8066b28c38ac4e5d
-
Filesize
10.1MB
MD50afb464d2654193dac667c26a24afbd0
SHA1cc52ed0e0caba7a3dab7b40f4d06605205d8a9df
SHA2568dc7625de7e66a1387caa9f6219533db636dcb1b26d77a8a868029c904f729c4
SHA5122290595bb7bc96b7d46ccce660c808bf58d18802e82f89407e6887d030e66ebe636c35fe917aed1c95f74387aab7c0f4a449f17749a8e58b8066b28c38ac4e5d