Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:27
Behavioral task
behavioral1
Sample
087de26a39e65a6ea417783f0faaa43b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
087de26a39e65a6ea417783f0faaa43b.exe
Resource
win10v2004-20231215-en
General
-
Target
087de26a39e65a6ea417783f0faaa43b.exe
-
Size
1.1MB
-
MD5
087de26a39e65a6ea417783f0faaa43b
-
SHA1
0880b8a9be0eacdec34609ceefbee81258287c77
-
SHA256
fcb013af969eda15bcac41e895653ec5eea09ce6b08f3adbd40733c7564d4407
-
SHA512
a4e86aa1198fc1c8d566fb042656aab08e2f2456d693751124e2a91f13f88ba0861a6cc71122744847153a5059ab437f68d31d915dedc8df296ad037bc157f1d
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ59O:iM5j8Z3aKHx5r+TuxX+IwffFZ59O
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x000c000000023200-5.dat family_gh0strat behavioral2/files/0x000c000000023200-6.dat family_gh0strat behavioral2/files/0x000c000000023200-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1468 svchest432048043204801465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 087de26a39e65a6ea417783f0faaa43b.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 087de26a39e65a6ea417783f0faaa43b.exe File opened for modification \??\c:\Windows\BJ.exe 087de26a39e65a6ea417783f0faaa43b.exe File created \??\c:\Windows\svchest432048043204801465662051.exe 087de26a39e65a6ea417783f0faaa43b.exe File opened for modification \??\c:\Windows\svchest432048043204801465662051.exe 087de26a39e65a6ea417783f0faaa43b.exe File created \??\c:\Windows\notepab.exe 087de26a39e65a6ea417783f0faaa43b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3644 wrote to memory of 1468 3644 087de26a39e65a6ea417783f0faaa43b.exe 21 PID 3644 wrote to memory of 1468 3644 087de26a39e65a6ea417783f0faaa43b.exe 21 PID 3644 wrote to memory of 1468 3644 087de26a39e65a6ea417783f0faaa43b.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\087de26a39e65a6ea417783f0faaa43b.exe"C:\Users\Admin\AppData\Local\Temp\087de26a39e65a6ea417783f0faaa43b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3644 -
\??\c:\Windows\svchest432048043204801465662051.exec:\Windows\svchest432048043204801465662051.exe2⤵
- Executes dropped EXE
PID:1468
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5369b0bdf8a8cc3448855e21d6ba9cc91
SHA127b89baf39f390a784907fb6c2cc9498eeba3c20
SHA2562ad34c8534fa28bd19da690ed1bc371cca929115a6578a053a3c8d4502dd1039
SHA5123c7c2101585df30dca36b39cd2fff18a49d365b59d553db24fa553ada45480279099fe92c9a5d12be841157dafaa0881488416b36d007e47842062cbe61bdfe3
-
Filesize
53KB
MD5bca9ff6eab03d22ca1f5decf41743e90
SHA16da1c9fa5c560016485d60445c490a5891cf7c2a
SHA2566ab603cdb813680fb06bd78ac313a1ebb8e4f8dc3b23329669089da0779ab2a5
SHA5121b25974b7285d0a9274d51d683e3c14cc77aea927e21b99eb4760e66d9e9449e56fc8139551da4336668aff2d6f159d2abcaeb445b1573631cb03d00c2e4f01e
-
Filesize
68KB
MD55203b9037652424d70e948da44ba1598
SHA1ac5ec4f70bf3d4045a78398d60fc328c09994ad2
SHA256af0835615284000401e052439229be9c1a192e61be55e79b782c6836b2822763
SHA51208a27502f452f291d195038fce02110d45821cb5ecca9b6015bbb63d10279ef8cceefc4714bc6e2c50edf588597eb789300333a77e857647a11fd12603c96bde