Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
14/10/2023, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4c6a749789a8812561ee6d5ad511e430.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4c6a749789a8812561ee6d5ad511e430.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4c6a749789a8812561ee6d5ad511e430.exe
-
Size
964KB
-
MD5
4c6a749789a8812561ee6d5ad511e430
-
SHA1
d74784915583eabbc6c1118979da92f17b73e6a9
-
SHA256
fcafdb31ef7cc7b76a86db6e0f49971058339baf41904e6f3cfa14f47f5da1cd
-
SHA512
8e8a10f880307917436771166e450f6d8ffd3aba284bc0c0ed509c882b45957715640ef5d043d46a29f51ef476a6ccfc9ea31765284338e3de03bef75ed0a6ea
-
SSDEEP
24576:3LWwz5awaq/+OrLC7np+ysI/bivSFDt8MfNGHEml6kb:3L95atOJrLC7p+ybiq1t8MfNG5db
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2816-9640-0x0000000000400000-0x0000000000537000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 620 Kigkmkk.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\Q: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\X: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\Y: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\E: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\G: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\I: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\J: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\L: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\S: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\T: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\V: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\Z: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\K: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\N: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\P: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\W: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\B: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\M: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\O: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\R: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\U: NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 25 IoCs
pid Process 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Kigkmkk.exe NEAS.4c6a749789a8812561ee6d5ad511e430.exe File created C:\Program Files (x86)\Kigkmkk.exe NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NEAS.4c6a749789a8812561ee6d5ad511e430.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2816 NEAS.4c6a749789a8812561ee6d5ad511e430.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4c6a749789a8812561ee6d5ad511e430.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4c6a749789a8812561ee6d5ad511e430.exe"1⤵
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:2816
-
C:\Program Files (x86)\Kigkmkk.exe"C:\Program Files (x86)\Kigkmkk.exe"1⤵
- Executes dropped EXE
PID:620
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
964KB
MD54c6a749789a8812561ee6d5ad511e430
SHA1d74784915583eabbc6c1118979da92f17b73e6a9
SHA256fcafdb31ef7cc7b76a86db6e0f49971058339baf41904e6f3cfa14f47f5da1cd
SHA5128e8a10f880307917436771166e450f6d8ffd3aba284bc0c0ed509c882b45957715640ef5d043d46a29f51ef476a6ccfc9ea31765284338e3de03bef75ed0a6ea