Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    13/10/2023, 21:28

General

  • Target

    bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe

  • Size

    955KB

  • MD5

    43300528f352509302e289669403ded9

  • SHA1

    a6644b5bed8ec405af2e0fc2a2dec86acffa4da3

  • SHA256

    bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88

  • SHA512

    3573586ac4fbc1114a17395d046843d9e31fa5005fee4bc2c9041f03281dc05858b9c93d4728135a91902f5f3d4bbc499c5a7c806e73ddce82397942eaee5562

  • SSDEEP

    24576:ZnRoUWPkfjHFMlfph5qXxtw7AWYGQMJG1hVMgjBS6Z2sj8J6mOo4fL:ZmbkjH2vgh8joh7jBS6Z2084TooL

Malware Config

Signatures

  • FatalRat

    FatalRat is a modular infostealer family written in C++ first appearing in June 2021.

  • Gh0st RAT payload 2 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Fatal Rat payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Identifies Wine through registry keys 2 TTPs 2 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe
    "C:\Users\Admin\AppData\Local\Temp\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell
      2⤵
        PID:2756
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command -
        2⤵
          PID:2692
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell
          2⤵
            PID:2292
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command -
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2628
          • C:\Users\Admin\AppData\Local\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe
            "C:\Users\Admin\AppData\Local\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe"
            2⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1632
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1516
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command -
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:528
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1716
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              powershell -Command -
              3⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:744

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe

          Filesize

          955KB

          MD5

          43300528f352509302e289669403ded9

          SHA1

          a6644b5bed8ec405af2e0fc2a2dec86acffa4da3

          SHA256

          bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88

          SHA512

          3573586ac4fbc1114a17395d046843d9e31fa5005fee4bc2c9041f03281dc05858b9c93d4728135a91902f5f3d4bbc499c5a7c806e73ddce82397942eaee5562

        • C:\Users\Admin\AppData\Local\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe

          Filesize

          955KB

          MD5

          43300528f352509302e289669403ded9

          SHA1

          a6644b5bed8ec405af2e0fc2a2dec86acffa4da3

          SHA256

          bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88

          SHA512

          3573586ac4fbc1114a17395d046843d9e31fa5005fee4bc2c9041f03281dc05858b9c93d4728135a91902f5f3d4bbc499c5a7c806e73ddce82397942eaee5562

        • C:\Users\Admin\AppData\Local\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe

          Filesize

          955KB

          MD5

          43300528f352509302e289669403ded9

          SHA1

          a6644b5bed8ec405af2e0fc2a2dec86acffa4da3

          SHA256

          bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88

          SHA512

          3573586ac4fbc1114a17395d046843d9e31fa5005fee4bc2c9041f03281dc05858b9c93d4728135a91902f5f3d4bbc499c5a7c806e73ddce82397942eaee5562

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IT6OZBP3YTKYFU8L07PB.temp

          Filesize

          7KB

          MD5

          6ca58d44a0aab6a5f173f523d91faa39

          SHA1

          d9785f550b3caec6930d5d57bf9a7d9a45d547c7

          SHA256

          8331f289de81ec372307b16dd151b5d240d6139e52098ddd7f06884e065a0a29

          SHA512

          8684fb10771fb314e0b7badaf30fe30a6aa98953c28c0689911cba1167a948e64abc42e2fd5f2fced48d331d5f62f2f3eb83b3b545c0e83a25062134cefffb12

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          6ca58d44a0aab6a5f173f523d91faa39

          SHA1

          d9785f550b3caec6930d5d57bf9a7d9a45d547c7

          SHA256

          8331f289de81ec372307b16dd151b5d240d6139e52098ddd7f06884e065a0a29

          SHA512

          8684fb10771fb314e0b7badaf30fe30a6aa98953c28c0689911cba1167a948e64abc42e2fd5f2fced48d331d5f62f2f3eb83b3b545c0e83a25062134cefffb12

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          6ca58d44a0aab6a5f173f523d91faa39

          SHA1

          d9785f550b3caec6930d5d57bf9a7d9a45d547c7

          SHA256

          8331f289de81ec372307b16dd151b5d240d6139e52098ddd7f06884e065a0a29

          SHA512

          8684fb10771fb314e0b7badaf30fe30a6aa98953c28c0689911cba1167a948e64abc42e2fd5f2fced48d331d5f62f2f3eb83b3b545c0e83a25062134cefffb12

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          6ca58d44a0aab6a5f173f523d91faa39

          SHA1

          d9785f550b3caec6930d5d57bf9a7d9a45d547c7

          SHA256

          8331f289de81ec372307b16dd151b5d240d6139e52098ddd7f06884e065a0a29

          SHA512

          8684fb10771fb314e0b7badaf30fe30a6aa98953c28c0689911cba1167a948e64abc42e2fd5f2fced48d331d5f62f2f3eb83b3b545c0e83a25062134cefffb12

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          69e0f40be5aa7dd7c300c4ecdf025e4c

          SHA1

          57c75998ce732bf6ef7171fa40d17f97703678d5

          SHA256

          e353a2a3d0e41af69cbcb28c989b40c63d0f57f82a0ff408659253aa239ffe38

          SHA512

          eb859e3aea41c0a6776379bb847b26824e79a759b31ca77f86bc547fcea87df8f9d0f6348d16ba8603b5c967df6787146dec74f5fa1c23501c164419deb82445

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          69e0f40be5aa7dd7c300c4ecdf025e4c

          SHA1

          57c75998ce732bf6ef7171fa40d17f97703678d5

          SHA256

          e353a2a3d0e41af69cbcb28c989b40c63d0f57f82a0ff408659253aa239ffe38

          SHA512

          eb859e3aea41c0a6776379bb847b26824e79a759b31ca77f86bc547fcea87df8f9d0f6348d16ba8603b5c967df6787146dec74f5fa1c23501c164419deb82445

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          69e0f40be5aa7dd7c300c4ecdf025e4c

          SHA1

          57c75998ce732bf6ef7171fa40d17f97703678d5

          SHA256

          e353a2a3d0e41af69cbcb28c989b40c63d0f57f82a0ff408659253aa239ffe38

          SHA512

          eb859e3aea41c0a6776379bb847b26824e79a759b31ca77f86bc547fcea87df8f9d0f6348d16ba8603b5c967df6787146dec74f5fa1c23501c164419deb82445

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms

          Filesize

          7KB

          MD5

          69e0f40be5aa7dd7c300c4ecdf025e4c

          SHA1

          57c75998ce732bf6ef7171fa40d17f97703678d5

          SHA256

          e353a2a3d0e41af69cbcb28c989b40c63d0f57f82a0ff408659253aa239ffe38

          SHA512

          eb859e3aea41c0a6776379bb847b26824e79a759b31ca77f86bc547fcea87df8f9d0f6348d16ba8603b5c967df6787146dec74f5fa1c23501c164419deb82445

        • C:\Users\Default\Desktop\athletes.exe

          Filesize

          955KB

          MD5

          43300528f352509302e289669403ded9

          SHA1

          a6644b5bed8ec405af2e0fc2a2dec86acffa4da3

          SHA256

          bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88

          SHA512

          3573586ac4fbc1114a17395d046843d9e31fa5005fee4bc2c9041f03281dc05858b9c93d4728135a91902f5f3d4bbc499c5a7c806e73ddce82397942eaee5562

        • \Users\Admin\AppData\Local\bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88.exe

          Filesize

          955KB

          MD5

          43300528f352509302e289669403ded9

          SHA1

          a6644b5bed8ec405af2e0fc2a2dec86acffa4da3

          SHA256

          bb4985dd9ac7d1165ea3efa792353e2131226de3d726e1197c83272fb46d8c88

          SHA512

          3573586ac4fbc1114a17395d046843d9e31fa5005fee4bc2c9041f03281dc05858b9c93d4728135a91902f5f3d4bbc499c5a7c806e73ddce82397942eaee5562

        • memory/528-109-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/528-104-0x0000000002880000-0x00000000028C0000-memory.dmp

          Filesize

          256KB

        • memory/528-103-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/528-105-0x0000000002880000-0x00000000028C0000-memory.dmp

          Filesize

          256KB

        • memory/528-106-0x0000000002880000-0x00000000028C0000-memory.dmp

          Filesize

          256KB

        • memory/528-102-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/528-108-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/528-116-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/528-112-0x0000000002880000-0x00000000028C0000-memory.dmp

          Filesize

          256KB

        • memory/528-111-0x0000000002880000-0x00000000028C0000-memory.dmp

          Filesize

          256KB

        • memory/528-110-0x0000000002880000-0x00000000028C0000-memory.dmp

          Filesize

          256KB

        • memory/1516-93-0x0000000002640000-0x0000000002680000-memory.dmp

          Filesize

          256KB

        • memory/1516-92-0x0000000002640000-0x0000000002680000-memory.dmp

          Filesize

          256KB

        • memory/1516-91-0x0000000072F00000-0x00000000734AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1516-88-0x0000000072F00000-0x00000000734AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1516-87-0x0000000002640000-0x0000000002680000-memory.dmp

          Filesize

          256KB

        • memory/1516-86-0x0000000002640000-0x0000000002680000-memory.dmp

          Filesize

          256KB

        • memory/1516-85-0x0000000002640000-0x0000000002680000-memory.dmp

          Filesize

          256KB

        • memory/1516-83-0x0000000072F00000-0x00000000734AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1516-94-0x0000000002640000-0x0000000002680000-memory.dmp

          Filesize

          256KB

        • memory/1516-95-0x0000000072F00000-0x00000000734AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1516-96-0x0000000072F00000-0x00000000734AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1632-71-0x0000000004150000-0x0000000004151000-memory.dmp

          Filesize

          4KB

        • memory/1632-74-0x0000000004170000-0x0000000004171000-memory.dmp

          Filesize

          4KB

        • memory/1632-161-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-160-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-157-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-151-0x0000000010000000-0x0000000010042000-memory.dmp

          Filesize

          264KB

        • memory/1632-149-0x0000000004870000-0x0000000004970000-memory.dmp

          Filesize

          1024KB

        • memory/1632-147-0x0000000004870000-0x0000000004970000-memory.dmp

          Filesize

          1024KB

        • memory/1632-67-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-143-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-132-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-70-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-127-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-89-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-73-0x0000000002130000-0x0000000002131000-memory.dmp

          Filesize

          4KB

        • memory/1632-72-0x0000000004140000-0x0000000004141000-memory.dmp

          Filesize

          4KB

        • memory/1632-75-0x0000000004120000-0x0000000004122000-memory.dmp

          Filesize

          8KB

        • memory/1632-76-0x0000000000720000-0x0000000000721000-memory.dmp

          Filesize

          4KB

        • memory/1632-77-0x0000000000730000-0x0000000000731000-memory.dmp

          Filesize

          4KB

        • memory/1632-90-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-107-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1632-84-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/1716-122-0x0000000072F00000-0x00000000734AB000-memory.dmp

          Filesize

          5.7MB

        • memory/1716-123-0x0000000002300000-0x0000000002340000-memory.dmp

          Filesize

          256KB

        • memory/1716-124-0x0000000002300000-0x0000000002340000-memory.dmp

          Filesize

          256KB

        • memory/2292-32-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2292-38-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2292-31-0x00000000026C0000-0x0000000002700000-memory.dmp

          Filesize

          256KB

        • memory/2292-29-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-44-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-50-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-41-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-40-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/2628-39-0x0000000072950000-0x0000000072EFB000-memory.dmp

          Filesize

          5.7MB

        • memory/2628-49-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/2628-46-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/2628-45-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/2628-42-0x0000000002700000-0x0000000002740000-memory.dmp

          Filesize

          256KB

        • memory/2776-6-0x0000000004110000-0x0000000004111000-memory.dmp

          Filesize

          4KB

        • memory/2776-30-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-12-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-10-0x00000000003F0000-0x00000000003F1000-memory.dmp

          Filesize

          4KB

        • memory/2776-9-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-5-0x00000000003E0000-0x00000000003E1000-memory.dmp

          Filesize

          4KB

        • memory/2776-13-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-7-0x0000000004120000-0x0000000004122000-memory.dmp

          Filesize

          8KB

        • memory/2776-8-0x0000000004170000-0x0000000004171000-memory.dmp

          Filesize

          4KB

        • memory/2776-2-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-4-0x0000000004150000-0x0000000004151000-memory.dmp

          Filesize

          4KB

        • memory/2776-3-0x0000000004140000-0x0000000004141000-memory.dmp

          Filesize

          4KB

        • memory/2776-21-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-11-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-47-0x00000000047F0000-0x00000000048F0000-memory.dmp

          Filesize

          1024KB

        • memory/2776-0-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-69-0x00000000047F0000-0x00000000048F0000-memory.dmp

          Filesize

          1024KB

        • memory/2776-1-0x0000000077000000-0x0000000077002000-memory.dmp

          Filesize

          8KB

        • memory/2776-68-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-66-0x0000000005430000-0x0000000005637000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-43-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB

        • memory/2776-51-0x00000000047F0000-0x00000000048F0000-memory.dmp

          Filesize

          1024KB

        • memory/2776-48-0x00000000047F0000-0x00000000048F0000-memory.dmp

          Filesize

          1024KB

        • memory/2776-53-0x0000000010000000-0x0000000010042000-memory.dmp

          Filesize

          264KB

        • memory/2776-52-0x0000000000400000-0x0000000000607000-memory.dmp

          Filesize

          2.0MB