Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 04:31
Behavioral task
behavioral1
Sample
05519970966eabccb2b0901eb020d76d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05519970966eabccb2b0901eb020d76d.exe
Resource
win10v2004-20231215-en
General
-
Target
05519970966eabccb2b0901eb020d76d.exe
-
Size
518KB
-
MD5
05519970966eabccb2b0901eb020d76d
-
SHA1
a8ff1ee3d3c695a4000897eb4397fba563fb50ca
-
SHA256
78efa53d368b27d54c5b74b866e23af1cb041c72d78a52a16cb398a724aa992b
-
SHA512
30c30fa464b7045e8084cc091c18aa6ca8acb443413dfce4ae63897450a202552253a4659c9155d813892839107772809175f7b8a175c9acf9cf4a64b8a4d55a
-
SSDEEP
12288:EzQr+1kZVQQxfnr+TK7r79/JDXWE18qRzfG4M5NCqX:UQKQVQQxfnr+TK7r79/JD71PRi4M5NC2
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x000c000000023149-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1308 svchest425075242507520.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\05519970966eabccb2b0901eb020d76d.exe" 05519970966eabccb2b0901eb020d76d.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification \??\c:\Windows\svchest425075242507520.exe 05519970966eabccb2b0901eb020d76d.exe File created \??\c:\Windows\BJ.exe 05519970966eabccb2b0901eb020d76d.exe File opened for modification \??\c:\Windows\BJ.exe 05519970966eabccb2b0901eb020d76d.exe File created \??\c:\Windows\svchest425075242507520.exe 05519970966eabccb2b0901eb020d76d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3080 wrote to memory of 1308 3080 05519970966eabccb2b0901eb020d76d.exe 89 PID 3080 wrote to memory of 1308 3080 05519970966eabccb2b0901eb020d76d.exe 89 PID 3080 wrote to memory of 1308 3080 05519970966eabccb2b0901eb020d76d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\05519970966eabccb2b0901eb020d76d.exe"C:\Users\Admin\AppData\Local\Temp\05519970966eabccb2b0901eb020d76d.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3080 -
\??\c:\Windows\svchest425075242507520.exec:\Windows\svchest425075242507520.exe2⤵
- Executes dropped EXE
PID:1308
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
518KB
MD505519970966eabccb2b0901eb020d76d
SHA1a8ff1ee3d3c695a4000897eb4397fba563fb50ca
SHA25678efa53d368b27d54c5b74b866e23af1cb041c72d78a52a16cb398a724aa992b
SHA51230c30fa464b7045e8084cc091c18aa6ca8acb443413dfce4ae63897450a202552253a4659c9155d813892839107772809175f7b8a175c9acf9cf4a64b8a4d55a