Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:13
Behavioral task
behavioral1
Sample
1c0a6c2808eb59a5577d5d415dd624a4.exe
Resource
win7-20231215-en
General
-
Target
1c0a6c2808eb59a5577d5d415dd624a4.exe
-
Size
133KB
-
MD5
1c0a6c2808eb59a5577d5d415dd624a4
-
SHA1
9f7b105a35dcb1604726f00c4b57a8cb0af8d99d
-
SHA256
863268e4b23b69e2bff3395be373ea17395c93c2f67bd3c4a77e892b9730bde2
-
SHA512
f48ad29a047630e0bbc1fb5752dd8f380d2734734ee3d7c0c148ac7bf5c6359e7067307683f0e67e3c3ba143b066d2cdb4da017f9b13c4d2ccdf0c7e5eafacbf
-
SSDEEP
3072:3hRciShZh3/nOZcsUhWPtKhXhCIqSS/Au37t0j8J2YJpD:3hKiSdWZcspt6hTLCAu37u8J2YJpD
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/1508-0-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral2/memory/1508-4-0x0000000000400000-0x0000000000422000-memory.dmp family_gh0strat behavioral2/files/0x0007000000023224-3.dat family_gh0strat behavioral2/files/0x0007000000023224-2.dat family_gh0strat -
Loads dropped DLL 1 IoCs
pid Process 4376 svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\data.dll 1c0a6c2808eb59a5577d5d415dd624a4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\plugin_info.ini 1c0a6c2808eb59a5577d5d415dd624a4.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe Token: SeRestorePrivilege 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe Token: SeBackupPrivilege 4376 svchost.exe Token: SeRestorePrivilege 4376 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1508 wrote to memory of 4796 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe 24 PID 1508 wrote to memory of 4796 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe 24 PID 1508 wrote to memory of 4796 1508 1c0a6c2808eb59a5577d5d415dd624a4.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c0a6c2808eb59a5577d5d415dd624a4.exe"C:\Users\Admin\AppData\Local\Temp\1c0a6c2808eb59a5577d5d415dd624a4.exe"1⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\1c0a6c2808eb59a5577d5d415dd624a4.exe"2⤵PID:4796
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4376
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD5c612a3e3027ce1998bca6f5e7e4ebc74
SHA1adba73c6563aaa709e5b1bca19d20f9a9aaa6d7e
SHA25610b2920d4e336d55094b459eb945711002a70773e4b7322b666a826c427cac8b
SHA51271381225ffb9789221d5b5e5a622bc88072fc3541944e9dffa83d0927c6962d6ce121be02c5a8800eee4e1f2fe450cf05fd9c79d8a552ac78694997790b3ecb7
-
Filesize
47KB
MD52f43a1ed4811c1bd1b4c0b88a50705d9
SHA1135f4dc2950d596555940291143e4435e8fdc62e
SHA256cc0f45d034b00834458e14b61b20183d6cd6f4b1597795dd7b1de37e52a6dd08
SHA5122c806bf453cea98d63147bbb88a693ae2226929fc86add325582219e9c091a3ff03b3a51343c34f5aa04f175dccc62952c105d94393e3e7f0e32ed7b357fe350