Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2023, 17:53
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4c6a749789a8812561ee6d5ad511e430.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4c6a749789a8812561ee6d5ad511e430.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4c6a749789a8812561ee6d5ad511e430.exe
-
Size
964KB
-
MD5
4c6a749789a8812561ee6d5ad511e430
-
SHA1
d74784915583eabbc6c1118979da92f17b73e6a9
-
SHA256
fcafdb31ef7cc7b76a86db6e0f49971058339baf41904e6f3cfa14f47f5da1cd
-
SHA512
8e8a10f880307917436771166e450f6d8ffd3aba284bc0c0ed509c882b45957715640ef5d043d46a29f51ef476a6ccfc9ea31765284338e3de03bef75ed0a6ea
-
SSDEEP
24576:3LWwz5awaq/+OrLC7np+ysI/bivSFDt8MfNGHEml6kb:3L95atOJrLC7p+ybiq1t8MfNG5db
Malware Config
Extracted
gh0strat
198.44.185.242
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/4464-13077-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral2/memory/4464-13082-0x0000000000400000-0x0000000000537000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\NEAS.4c6a749789a8812561ee6d5ad511e430.exe" NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\I: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\M: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\O: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\S: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\W: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\J: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\K: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\N: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\P: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\V: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\B: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\E: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\L: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\X: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\Y: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\Z: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\G: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\Q: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\R: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\T: NEAS.4c6a749789a8812561ee6d5ad511e430.exe File opened (read-only) \??\U: NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 34 IoCs
pid Process 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz NEAS.4c6a749789a8812561ee6d5ad511e430.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 NEAS.4c6a749789a8812561ee6d5ad511e430.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe 4464 NEAS.4c6a749789a8812561ee6d5ad511e430.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.4c6a749789a8812561ee6d5ad511e430.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.4c6a749789a8812561ee6d5ad511e430.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4464