Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1gosh/3.vbs
windows7-x64
1gosh/3.vbs
windows10-2004-x64
1gosh/gcc.js
windows7-x64
1gosh/gcc.js
windows10-2004-x64
1gosh/gen-pass.sh
ubuntu-18.04-amd64
1gosh/gen-pass.sh
debian-9-armhf
1gosh/gen-pass.sh
debian-9-mips
1gosh/gen-pass.sh
debian-9-mipsel
1gosh/go.sh
windows7-x64
3gosh/go.sh
windows10-2004-x64
3gosh/pscan2
ubuntu-18.04-amd64
gosh/scam
ubuntu-18.04-amd64
6gosh/scam
debian-9-armhf
6gosh/scam
debian-9-mips
6gosh/scam
debian-9-mipsel
3gosh/secure
ubuntu-18.04-amd64
3gosh/secure
debian-9-armhf
3gosh/secure
debian-9-mips
1gosh/secure
debian-9-mipsel
1gosh/ss
ubuntu-18.04-amd64
1gosh/ssh-scan
ubuntu-18.04-amd64
1Analysis
-
max time kernel
121s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
gosh/3.vbs
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
gosh/3.vbs
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
gosh/gcc.js
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
gosh/gcc.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
gosh/gen-pass.sh
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral6
Sample
gosh/gen-pass.sh
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral7
Sample
gosh/gen-pass.sh
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral8
Sample
gosh/gen-pass.sh
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral9
Sample
gosh/go.sh
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
gosh/go.sh
Resource
win10v2004-20231215-en
Behavioral task
behavioral11
Sample
gosh/pscan2
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral12
Sample
gosh/scam
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral13
Sample
gosh/scam
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral14
Sample
gosh/scam
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral15
Sample
gosh/scam
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral16
Sample
gosh/secure
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral17
Sample
gosh/secure
Resource
debian9-armhf-20231215-en
Behavioral task
behavioral18
Sample
gosh/secure
Resource
debian9-mipsbe-20231215-en
Behavioral task
behavioral19
Sample
gosh/secure
Resource
debian9-mipsel-20231215-en
Behavioral task
behavioral20
Sample
gosh/ss
Resource
ubuntu1804-amd64-20231215-en
Behavioral task
behavioral21
Sample
gosh/ssh-scan
Resource
ubuntu1804-amd64-20231215-en
General
-
Target
gosh/go.sh
-
Size
162B
-
MD5
3d69a2f2b88abdeabfa5c522499a1c28
-
SHA1
c9e7c1c34d713016a8489a36f84cbf2a6c607cf8
-
SHA256
3a44dde159adcb55c2fe5e26f4bc1a3a0ac5975b6ae9ec8ed5cb93666a087ba2
-
SHA512
41a9bacbe42607d4e20512ea4db050ae013010e94131f507d32c7930b2afd416eda2eb01eb04851be504ef0bfe35696a9b36f636db2f586879e626376bb5158a
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\sh_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\sh_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.sh\ = "sh_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\sh_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\sh_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\.sh rundll32.exe Key created \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\sh_auto_file\shell rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-928733405-3780110381-2966456290-1000_CLASSES\sh_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2536 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2536 AcroRd32.exe 2536 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2252 wrote to memory of 2800 2252 cmd.exe 22 PID 2252 wrote to memory of 2800 2252 cmd.exe 22 PID 2252 wrote to memory of 2800 2252 cmd.exe 22 PID 2800 wrote to memory of 2536 2800 rundll32.exe 30 PID 2800 wrote to memory of 2536 2800 rundll32.exe 30 PID 2800 wrote to memory of 2536 2800 rundll32.exe 30 PID 2800 wrote to memory of 2536 2800 rundll32.exe 30
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\gosh\go.sh1⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\gosh\go.sh2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\gosh\go.sh"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2536
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5c8f6db0deb8a4acc56bdd192c2d271f4
SHA171cb803e92a3ffbeadaabce9aed25ef80ffd8e8c
SHA25657e5d888f2f3ad38b42d24c607c8b74bac12a9cb6d209bd7a21f7de3784ddbba
SHA5120b2cf9a8a9eda3087b5ad53baadad7d48b888af7712011c409b0b33c503450dc9adcf7849dd9cad313c5fe8d30e76e621b1496da3a3ad062762d2f25d7888b7d