Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 19:51
Behavioral task
behavioral1
Sample
0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll
Resource
win7-20231023-en
General
-
Target
0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll
-
Size
537KB
-
MD5
ada42bc98a05a0ffe6bc97cedc50197c
-
SHA1
3d1209bcddf2787e29d1fd354abfcbaf4ffeefc7
-
SHA256
0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209
-
SHA512
aa9619c23c1afe56a824fa980d6bf61ffb2bd1d962b6551a1569a79c1990a316df93af76700dbbcc37259ec8caeaa6f5309b19a6c32c47992efdd39f619b647c
-
SSDEEP
12288:8IHDE4QGEc9C6CBLKYOfH+OkfGhzlRYO0tHs3jiojajWv+Mb5:JjE4QGF46KLHOfeO+qctH+jdjPvRb5
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4684-1-0x0000000002910000-0x0000000002AAD000-memory.dmp purplefox_rootkit behavioral2/memory/4684-16-0x0000000010000000-0x0000000010182000-memory.dmp purplefox_rootkit behavioral2/memory/4684-19-0x0000000010000000-0x0000000010182000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/4684-1-0x0000000002910000-0x0000000002AAD000-memory.dmp family_gh0strat behavioral2/memory/4684-16-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat behavioral2/memory/4684-19-0x0000000010000000-0x0000000010182000-memory.dmp family_gh0strat -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 5036 Skcja.exe -
resource yara_rule behavioral2/memory/4684-0-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral2/memory/4684-16-0x0000000010000000-0x0000000010182000-memory.dmp upx behavioral2/memory/4684-19-0x0000000010000000-0x0000000010182000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\rundll32.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4452 PING.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4684 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 568 wrote to memory of 4684 568 rundll32.exe 88 PID 568 wrote to memory of 4684 568 rundll32.exe 88 PID 568 wrote to memory of 4684 568 rundll32.exe 88 PID 4684 wrote to memory of 5036 4684 rundll32.exe 92 PID 4684 wrote to memory of 5036 4684 rundll32.exe 92 PID 4684 wrote to memory of 5036 4684 rundll32.exe 92 PID 4684 wrote to memory of 1496 4684 rundll32.exe 97 PID 4684 wrote to memory of 1496 4684 rundll32.exe 97 PID 4684 wrote to memory of 1496 4684 rundll32.exe 97 PID 1496 wrote to memory of 4452 1496 cmd.exe 99 PID 1496 wrote to memory of 4452 1496 cmd.exe 99 PID 1496 wrote to memory of 4452 1496 cmd.exe 99
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0c56b0c9bc116353a25ab0c22bcdc043ba93024e572431d920fa34ec3c4e5209.dll,#12⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Skcja.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Skcja.exe"3⤵
- Executes dropped EXE
PID:5036
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Windows\SysWOW64\rundll32.exe > nul3⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.14⤵
- Runs ping.exe
PID:4452
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
500.1MB
MD556eb0e5a97d3389ca6800487c5cb8e44
SHA17cf6a3d54eef86159fc79d5d12092aae3653468d
SHA25638f32574bd6d0f371e18ce01cef91949d1394605af35074c2097015a40d4c158
SHA512f476745a2555372d6c906e5b93046037365c8bd48c341edc73e39070484de3aa931465ce12f2d978bad3df362a6acff79b1919c7e913303eca3cb620e8ada43b
-
Filesize
500.1MB
MD556eb0e5a97d3389ca6800487c5cb8e44
SHA17cf6a3d54eef86159fc79d5d12092aae3653468d
SHA25638f32574bd6d0f371e18ce01cef91949d1394605af35074c2097015a40d4c158
SHA512f476745a2555372d6c906e5b93046037365c8bd48c341edc73e39070484de3aa931465ce12f2d978bad3df362a6acff79b1919c7e913303eca3cb620e8ada43b