Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    127s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/10/2023, 10:06

General

  • Target

    Signal6.9.6.exe

  • Size

    114.5MB

  • MD5

    f6d697fd79c8510c929350efffa8543b

  • SHA1

    36f7477cb84c450847d6bf0cc9842228194bf56a

  • SHA256

    99ad30a4c3147042b2929585183736bc1135558c7efb2c5d6bc6c33d850ac301

  • SHA512

    5be24571406c2fc1c7dd3cfabba9e05a1276552dbc3d6fb1488c02c8daea0d46ee7b005f38b67eff67f0ee1c49f7c5fcae0cdc80d1c85a9f38ed81383e89d023

  • SSDEEP

    3145728:VtGIPHBudiuFrz8WWKRx4YcmyDqDkU2inxwMGZJ/w0EhPNn:VxQr1znWKRx4Bm7rxjG7wX

Malware Config

Signatures

  • Gh0st RAT payload 5 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 4 IoCs
  • Identifies Wine through registry keys 2 TTPs 1 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 3 IoCs
  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • VMProtect packed file 8 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Signal6.9.6.exe
    "C:\Users\Admin\AppData\Local\Temp\Signal6.9.6.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\a3.exe
      "C:\Program Files (x86)\a3.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2652
  • C:\Users\Public\Documents\123\PTvrst.exe
    "C:\Users\Public\Documents\123\PTvrst.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Executes dropped EXE
    • Identifies Wine through registry keys
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:540
    • C:\WINDOWS\DNomb\spolsvt.exe
      C:\WINDOWS\DNomb\spolsvt.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Users\Public\Documents\t\spolsvt.exe
        C:\Users\Public\Documents\t\spolsvt.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\a3.exe

    Filesize

    5.6MB

    MD5

    0481d5db958410e104c3ec077eeb6b5a

    SHA1

    2b52d36fa7feed40fd6e27749aa164b48a615f75

    SHA256

    c29eb3ea929319a884bb8061faf36e855d93f44ba1362441d5fa34f70613181a

    SHA512

    af6bcd124350e3f669b71c349f31c44fef8b1047ff101638057ea349ea5fe9db518f1a3dcbac1d72a8ce918de0b40c753adc15fbc79558bc41126766ee39b4ed

  • C:\Program Files (x86)\a3.exe

    Filesize

    5.6MB

    MD5

    0481d5db958410e104c3ec077eeb6b5a

    SHA1

    2b52d36fa7feed40fd6e27749aa164b48a615f75

    SHA256

    c29eb3ea929319a884bb8061faf36e855d93f44ba1362441d5fa34f70613181a

    SHA512

    af6bcd124350e3f669b71c349f31c44fef8b1047ff101638057ea349ea5fe9db518f1a3dcbac1d72a8ce918de0b40c753adc15fbc79558bc41126766ee39b4ed

  • C:\Program Files (x86)\a3.exe

    Filesize

    5.6MB

    MD5

    0481d5db958410e104c3ec077eeb6b5a

    SHA1

    2b52d36fa7feed40fd6e27749aa164b48a615f75

    SHA256

    c29eb3ea929319a884bb8061faf36e855d93f44ba1362441d5fa34f70613181a

    SHA512

    af6bcd124350e3f669b71c349f31c44fef8b1047ff101638057ea349ea5fe9db518f1a3dcbac1d72a8ce918de0b40c753adc15fbc79558bc41126766ee39b4ed

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\123\PTvrst.exe

    Filesize

    1.2MB

    MD5

    d22cfb5bfaeb1503b12b07e53ef0a149

    SHA1

    8ea2c85e363f551a159fabd65377affed4e417a1

    SHA256

    260464fb05210cfb30ef7a12d568f75eb781634b251d958cae8911948f6ca360

    SHA512

    151024cb2960b1ee485ded7ccbb753fe368a93fda5699af72e568667fa54bfb0d1732444e7b60efaab6d372204157cdb6abbf8862d0e89d612dd963342215e45

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • C:\WINDOWS\DNomb\Mpec.mbt

    Filesize

    488KB

    MD5

    b080a7a33830f264ce71c2d4fc6cbed5

    SHA1

    3e2ac32e40441a059f24cb1bec27c1ef533641ae

    SHA256

    490acedca10ec4e45ca5cc26fcaf49f40358ae3edd413597cecccaab801ff982

    SHA512

    2d424f0901af4d787aaa2f8319de174ef3b386848bca3e72279f567d329afc570007680f54b551f5072c996a7323062ba1aaa3a04a54786dc6791660587f9c6b

  • C:\WINDOWS\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • C:\Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • \Program Files (x86)\a3.exe

    Filesize

    5.6MB

    MD5

    0481d5db958410e104c3ec077eeb6b5a

    SHA1

    2b52d36fa7feed40fd6e27749aa164b48a615f75

    SHA256

    c29eb3ea929319a884bb8061faf36e855d93f44ba1362441d5fa34f70613181a

    SHA512

    af6bcd124350e3f669b71c349f31c44fef8b1047ff101638057ea349ea5fe9db518f1a3dcbac1d72a8ce918de0b40c753adc15fbc79558bc41126766ee39b4ed

  • \Users\Public\Documents\t\spolsvt.exe

    Filesize

    16KB

    MD5

    cdce4713e784ae069d73723034a957ff

    SHA1

    9a393a6bab6568f1a774fb753353223f11367e09

    SHA256

    b29e48102ecb3d3614e8980a8b8cc63dd2b993c6346f466479244ec2b47b69d8

    SHA512

    0a3a59a305cc2a6fad4e1315b0bcc5a4129595dfe1e8b703363fa02528d2d7c48d3fd22d365708be84a5557cf1916873df9563c454732f93f94a66e7e3b9fb0f

  • \Windows\DNomb\spolsvt.exe

    Filesize

    9KB

    MD5

    523d5c39f9d8d2375c3df68251fa2249

    SHA1

    d4ed365c44bec9246fc1a65a32a7791792647a10

    SHA256

    20e3dc90a3e83b6202e2a7f4603b60e5e859639cb68693426c400b13aaeabd78

    SHA512

    526e1bba30d03f1ac177c6ab7409187a730969c429cebef15da68ffcf44b3b93227781eebc827b2f7a0fa17c391e00a0e532263fd0167aeaeb0456f96cfe3ae4

  • memory/540-84-0x0000000004380000-0x0000000004381000-memory.dmp

    Filesize

    4KB

  • memory/540-70-0x0000000004230000-0x0000000004231000-memory.dmp

    Filesize

    4KB

  • memory/540-81-0x0000000004360000-0x0000000004361000-memory.dmp

    Filesize

    4KB

  • memory/540-80-0x00000000042D0000-0x00000000042D1000-memory.dmp

    Filesize

    4KB

  • memory/540-79-0x0000000004280000-0x0000000004281000-memory.dmp

    Filesize

    4KB

  • memory/540-73-0x00000000041F0000-0x00000000041F1000-memory.dmp

    Filesize

    4KB

  • memory/540-74-0x0000000004290000-0x0000000004291000-memory.dmp

    Filesize

    4KB

  • memory/540-75-0x00000000042E0000-0x00000000042E1000-memory.dmp

    Filesize

    4KB

  • memory/540-76-0x0000000004330000-0x0000000004331000-memory.dmp

    Filesize

    4KB

  • memory/540-77-0x0000000004370000-0x0000000004371000-memory.dmp

    Filesize

    4KB

  • memory/540-86-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/540-82-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/540-78-0x00000000041C0000-0x00000000041C1000-memory.dmp

    Filesize

    4KB

  • memory/540-83-0x00000000042A0000-0x00000000042A1000-memory.dmp

    Filesize

    4KB

  • memory/540-72-0x0000000004220000-0x0000000004221000-memory.dmp

    Filesize

    4KB

  • memory/540-62-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/540-139-0x0000000000400000-0x00000000006A2000-memory.dmp

    Filesize

    2.6MB

  • memory/540-63-0x0000000076F60000-0x0000000076F62000-memory.dmp

    Filesize

    8KB

  • memory/540-65-0x0000000004200000-0x0000000004201000-memory.dmp

    Filesize

    4KB

  • memory/540-64-0x0000000004320000-0x0000000004321000-memory.dmp

    Filesize

    4KB

  • memory/540-67-0x0000000004270000-0x0000000004271000-memory.dmp

    Filesize

    4KB

  • memory/540-66-0x00000000042B0000-0x00000000042B1000-memory.dmp

    Filesize

    4KB

  • memory/540-69-0x0000000004300000-0x0000000004301000-memory.dmp

    Filesize

    4KB

  • memory/540-68-0x0000000004310000-0x0000000004311000-memory.dmp

    Filesize

    4KB

  • memory/540-71-0x00000000042F0000-0x00000000042F2000-memory.dmp

    Filesize

    8KB

  • memory/1720-160-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1720-158-0x0000000000AE0000-0x0000000000AF2000-memory.dmp

    Filesize

    72KB

  • memory/1720-153-0x0000000002AE0000-0x0000000002C2D000-memory.dmp

    Filesize

    1.3MB

  • memory/1720-152-0x0000000002AE0000-0x0000000002C2D000-memory.dmp

    Filesize

    1.3MB

  • memory/1720-150-0x0000000002AE0000-0x0000000002C2D000-memory.dmp

    Filesize

    1.3MB

  • memory/1720-120-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1720-118-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1720-116-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/1932-53-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/1932-0-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/1932-145-0x0000000000400000-0x00000000004B4000-memory.dmp

    Filesize

    720KB

  • memory/2652-40-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2652-17-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2652-47-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2652-48-0x0000000076F70000-0x0000000076F71000-memory.dmp

    Filesize

    4KB

  • memory/2652-45-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2652-43-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2652-42-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2652-11-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2652-14-0x0000000000400000-0x0000000000DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2652-13-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2652-16-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2652-19-0x0000000000400000-0x0000000000DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2652-20-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2652-140-0x0000000000400000-0x0000000000DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2652-57-0x0000000000400000-0x0000000000DEC000-memory.dmp

    Filesize

    9.9MB

  • memory/2652-30-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2652-32-0x0000000000280000-0x0000000000281000-memory.dmp

    Filesize

    4KB

  • memory/2652-35-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2652-37-0x0000000000290000-0x0000000000291000-memory.dmp

    Filesize

    4KB

  • memory/2652-27-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2652-22-0x0000000000260000-0x0000000000261000-memory.dmp

    Filesize

    4KB

  • memory/2652-25-0x0000000000270000-0x0000000000271000-memory.dmp

    Filesize

    4KB

  • memory/2712-108-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-104-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2712-103-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-100-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-97-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-94-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-92-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB

  • memory/2712-89-0x0000000000400000-0x0000000000516000-memory.dmp

    Filesize

    1.1MB