Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231020-en -
resource tags
arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system -
submitted
25/11/2023, 19:09
Behavioral task
behavioral1
Sample
30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe
Resource
win10v2004-20231023-en
General
-
Target
30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe
-
Size
119KB
-
MD5
960774715ccb5113ea06552370657bf9
-
SHA1
7722974d6a97107237fbcd163f90a192c97b6720
-
SHA256
30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77
-
SHA512
df8f57a323aba83bfe2e32f2917ed17ed1aeb8064fe151ea1024c0bd2862e6328044909e93e24e5863bb8a2c49c8ca84e61f4ad72db1efddf138807958d45164
-
SSDEEP
3072:SyIpG2/iDbY7lJEbG4srgFNv66CJT5KexsaJ1h:jIpos7gzsKNvbCtfx
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/memory/1196-1-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/2428-13-0x0000000000400000-0x0000000000467000-memory.dmp family_gh0strat behavioral1/memory/2776-18-0x0000000000400000-0x0000000000467000-memory.dmp family_gh0strat behavioral1/memory/1196-19-0x0000000000400000-0x0000000000467000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2428 Gnmfgif.pif 2776 Gnmfgif.pif -
resource yara_rule behavioral1/memory/1196-0-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/files/0x000700000001210b-6.dat upx behavioral1/memory/2428-7-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2428-13-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/files/0x000700000001210b-12.dat upx behavioral1/files/0x000700000001210b-11.dat upx behavioral1/memory/2776-14-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/2776-18-0x0000000000400000-0x0000000000467000-memory.dmp upx behavioral1/memory/1196-19-0x0000000000400000-0x0000000000467000-memory.dmp upx -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\X: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\Z: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\M: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\L: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\R: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\W: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\K: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\I: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\J: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\O: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\Q: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\S: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\T: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\U: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\B: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\Y: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\G: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\H: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\N: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\P: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened (read-only) \??\E: 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft Iwgioc\Gnmfgif.pif 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe File opened for modification C:\Program Files (x86)\Microsoft Iwgioc\Gnmfgif.pif 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1196 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe 1196 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe 1196 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe 2428 Gnmfgif.pif 2428 Gnmfgif.pif 2428 Gnmfgif.pif 2776 Gnmfgif.pif 2776 Gnmfgif.pif 2776 Gnmfgif.pif 1196 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1196 30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2428 wrote to memory of 2776 2428 Gnmfgif.pif 29 PID 2428 wrote to memory of 2776 2428 Gnmfgif.pif 29 PID 2428 wrote to memory of 2776 2428 Gnmfgif.pif 29 PID 2428 wrote to memory of 2776 2428 Gnmfgif.pif 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe"C:\Users\Admin\AppData\Local\Temp\30e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1196
-
C:\Program Files (x86)\Microsoft Iwgioc\Gnmfgif.pif"C:\Program Files (x86)\Microsoft Iwgioc\Gnmfgif.pif"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files (x86)\Microsoft Iwgioc\Gnmfgif.pif"C:\Program Files (x86)\Microsoft Iwgioc\Gnmfgif.pif" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5960774715ccb5113ea06552370657bf9
SHA17722974d6a97107237fbcd163f90a192c97b6720
SHA25630e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77
SHA512df8f57a323aba83bfe2e32f2917ed17ed1aeb8064fe151ea1024c0bd2862e6328044909e93e24e5863bb8a2c49c8ca84e61f4ad72db1efddf138807958d45164
-
Filesize
119KB
MD5960774715ccb5113ea06552370657bf9
SHA17722974d6a97107237fbcd163f90a192c97b6720
SHA25630e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77
SHA512df8f57a323aba83bfe2e32f2917ed17ed1aeb8064fe151ea1024c0bd2862e6328044909e93e24e5863bb8a2c49c8ca84e61f4ad72db1efddf138807958d45164
-
Filesize
119KB
MD5960774715ccb5113ea06552370657bf9
SHA17722974d6a97107237fbcd163f90a192c97b6720
SHA25630e85e13bf07a98130960ae1bec886cf06cc1719c97ba463a29851572af8ed77
SHA512df8f57a323aba83bfe2e32f2917ed17ed1aeb8064fe151ea1024c0bd2862e6328044909e93e24e5863bb8a2c49c8ca84e61f4ad72db1efddf138807958d45164