Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 17:21
Behavioral task
behavioral1
Sample
082b62faa8f24c0b36a229ff03ecc9fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
082b62faa8f24c0b36a229ff03ecc9fd.exe
Resource
win10v2004-20231215-en
General
-
Target
082b62faa8f24c0b36a229ff03ecc9fd.exe
-
Size
532KB
-
MD5
082b62faa8f24c0b36a229ff03ecc9fd
-
SHA1
c6e79574655a71ae5d4e1c6e4d5fa3fd3c10fc80
-
SHA256
3dbdf9b4ba42fe2773f2aa22abab831dfad99ca664c194624d43eb382d67e6b6
-
SHA512
71aaa38975ec26316c10276c599a3e2b8de583d6a6b253083dfa10a3c613d773e087456cb07c64e2c35222337b987830cf6bf2bcd2e14a4ed363fa4dfae6b8fd
-
SSDEEP
12288:q08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahHjb:t8AVQQxfnr+TK7r79/J0ofrJEyM5ahDb
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000c00000001444d-8.dat family_gh0strat behavioral1/files/0x000c00000001444d-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2516 (null)0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\082b62faa8f24c0b36a229ff03ecc9fd.exe" 082b62faa8f24c0b36a229ff03ecc9fd.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 082b62faa8f24c0b36a229ff03ecc9fd.exe File created \??\c:\Windows\(null)0.exe 082b62faa8f24c0b36a229ff03ecc9fd.exe File created \??\c:\Windows\BJ.exe 082b62faa8f24c0b36a229ff03ecc9fd.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2512 wrote to memory of 2516 2512 082b62faa8f24c0b36a229ff03ecc9fd.exe 14 PID 2512 wrote to memory of 2516 2512 082b62faa8f24c0b36a229ff03ecc9fd.exe 14 PID 2512 wrote to memory of 2516 2512 082b62faa8f24c0b36a229ff03ecc9fd.exe 14 PID 2512 wrote to memory of 2516 2512 082b62faa8f24c0b36a229ff03ecc9fd.exe 14
Processes
-
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe1⤵
- Executes dropped EXE
PID:2516
-
C:\Users\Admin\AppData\Local\Temp\082b62faa8f24c0b36a229ff03ecc9fd.exe"C:\Users\Admin\AppData\Local\Temp\082b62faa8f24c0b36a229ff03ecc9fd.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD501be56d14b27d3bb5564a1e8cf139928
SHA1f15e3419315a15156b0c30842f9359adddaea60f
SHA25680af8a023fc313f4fe8b8dee26685ee4d2e8062b1f4c4c93fb6e4d4bd23cbb84
SHA5126aeaa2c302320a11ac0950dd950cebc05e5f27902e2ea61ab1e56f0086ed04e5607ef90120416d667c10eab742d52a46c8708ce66297c0264140b0651d98e459
-
Filesize
35KB
MD5bff58479506b3358937d309ad3438499
SHA16638ff186fbd98dc4d5d363bb9a91e883f92da41
SHA2566e39daa00c45949c68840f2e6321b34726a60ea3fb803058227078ec6a015863
SHA51272abce334d03b6485ba94953bdefd84f7813bfaf93d22c8d178c82ba04e44fae3d5b304e880ea055cf5052c033960d8db9edc4ec17693aff8c5128dded22f505