Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
24/11/2023, 23:20
Static task
static1
Behavioral task
behavioral1
Sample
64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe
Resource
win10v2004-20231023-en
General
-
Target
64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe
-
Size
496KB
-
MD5
3e821ec6513319de7cf6430a2f2ad072
-
SHA1
da2da5e6eafd983d7271a0898031d88205d1c03c
-
SHA256
64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79
-
SHA512
d8025c62e5c40d8b925115cc24f08ea54572ffd29fb907a47a6981f0d8682bb7057b8ede436d2fd7d67067d3e878ddd903f70be6b11cefddbeff7ef706fe321e
-
SSDEEP
6144:QdyLEbWaR5CcwVPyZ5WfvD6Retk5ArfM:sUaWaR5vwNyZ5ckevrfM
Malware Config
Extracted
gh0strat
110.41.134.233
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2232-0-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2540 Dumper.exe 2672 Dumper.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\G: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\M: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\Q: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\T: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\W: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\X: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\B: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\H: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\J: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\K: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\L: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\N: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\P: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\S: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\I: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\Y: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\O: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\R: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\U: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\V: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File opened (read-only) \??\Z: 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Dumper.exe 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe File created C:\Program Files (x86)\Dumper.exe 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2232 64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2672 2540 Dumper.exe 29 PID 2540 wrote to memory of 2672 2540 Dumper.exe 29 PID 2540 wrote to memory of 2672 2540 Dumper.exe 29 PID 2540 wrote to memory of 2672 2540 Dumper.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe"C:\Users\Admin\AppData\Local\Temp\64174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2232
-
C:\Program Files (x86)\Dumper.exe"C:\Program Files (x86)\Dumper.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Program Files (x86)\Dumper.exe"C:\Program Files (x86)\Dumper.exe" Win72⤵
- Executes dropped EXE
PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD53e821ec6513319de7cf6430a2f2ad072
SHA1da2da5e6eafd983d7271a0898031d88205d1c03c
SHA25664174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79
SHA512d8025c62e5c40d8b925115cc24f08ea54572ffd29fb907a47a6981f0d8682bb7057b8ede436d2fd7d67067d3e878ddd903f70be6b11cefddbeff7ef706fe321e
-
Filesize
496KB
MD53e821ec6513319de7cf6430a2f2ad072
SHA1da2da5e6eafd983d7271a0898031d88205d1c03c
SHA25664174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79
SHA512d8025c62e5c40d8b925115cc24f08ea54572ffd29fb907a47a6981f0d8682bb7057b8ede436d2fd7d67067d3e878ddd903f70be6b11cefddbeff7ef706fe321e
-
Filesize
496KB
MD53e821ec6513319de7cf6430a2f2ad072
SHA1da2da5e6eafd983d7271a0898031d88205d1c03c
SHA25664174ba6ce7bc134f989a87a12cee143452b2530ea05b449bd76936b58500c79
SHA512d8025c62e5c40d8b925115cc24f08ea54572ffd29fb907a47a6981f0d8682bb7057b8ede436d2fd7d67067d3e878ddd903f70be6b11cefddbeff7ef706fe321e