Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    147s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 17:27

General

  • Target

    087de26a39e65a6ea417783f0faaa43b.exe

  • Size

    1.1MB

  • MD5

    087de26a39e65a6ea417783f0faaa43b

  • SHA1

    0880b8a9be0eacdec34609ceefbee81258287c77

  • SHA256

    fcb013af969eda15bcac41e895653ec5eea09ce6b08f3adbd40733c7564d4407

  • SHA512

    a4e86aa1198fc1c8d566fb042656aab08e2f2456d693751124e2a91f13f88ba0861a6cc71122744847153a5059ab437f68d31d915dedc8df296ad037bc157f1d

  • SSDEEP

    12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZ59O:iM5j8Z3aKHx5r+TuxX+IwffFZ59O

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\087de26a39e65a6ea417783f0faaa43b.exe
    "C:\Users\Admin\AppData\Local\Temp\087de26a39e65a6ea417783f0faaa43b.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:3644
    • \??\c:\Windows\svchest432048043204801465662051.exe
      c:\Windows\svchest432048043204801465662051.exe
      2⤵
      • Executes dropped EXE
      PID:1468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\svchest432048043204801465662051.exe

    Filesize

    65KB

    MD5

    369b0bdf8a8cc3448855e21d6ba9cc91

    SHA1

    27b89baf39f390a784907fb6c2cc9498eeba3c20

    SHA256

    2ad34c8534fa28bd19da690ed1bc371cca929115a6578a053a3c8d4502dd1039

    SHA512

    3c7c2101585df30dca36b39cd2fff18a49d365b59d553db24fa553ada45480279099fe92c9a5d12be841157dafaa0881488416b36d007e47842062cbe61bdfe3

  • C:\Windows\svchest432048043204801465662051.exe

    Filesize

    53KB

    MD5

    bca9ff6eab03d22ca1f5decf41743e90

    SHA1

    6da1c9fa5c560016485d60445c490a5891cf7c2a

    SHA256

    6ab603cdb813680fb06bd78ac313a1ebb8e4f8dc3b23329669089da0779ab2a5

    SHA512

    1b25974b7285d0a9274d51d683e3c14cc77aea927e21b99eb4760e66d9e9449e56fc8139551da4336668aff2d6f159d2abcaeb445b1573631cb03d00c2e4f01e

  • \??\c:\Windows\svchest432048043204801465662051.exe

    Filesize

    68KB

    MD5

    5203b9037652424d70e948da44ba1598

    SHA1

    ac5ec4f70bf3d4045a78398d60fc328c09994ad2

    SHA256

    af0835615284000401e052439229be9c1a192e61be55e79b782c6836b2822763

    SHA512

    08a27502f452f291d195038fce02110d45821cb5ecca9b6015bbb63d10279ef8cceefc4714bc6e2c50edf588597eb789300333a77e857647a11fd12603c96bde