Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 06:03

General

  • Target

    0a1df81fa676026fcf4fc52d5dce5316.exe

  • Size

    117KB

  • MD5

    0a1df81fa676026fcf4fc52d5dce5316

  • SHA1

    5ec48650f2931cf1a91b74744dda5253629bad5e

  • SHA256

    f0939b4c1b666b56f4ab532c5facf3ffab9d98b72bcbc7227f7e72cf1d629b27

  • SHA512

    84a04ab3bb54ecef996f29395fb2c5462b39c1c1196860df2fef570c216ca5db85e8ed5909a672e27a380772c6719df0904b97b86e20df2e02afbfc1592543a1

  • SSDEEP

    3072:u6aPDNySoINvmV1MSNa7y+T9ZU65KH1xjlWnsihabzn0Dk1X:u6aRCINvm4SNoxZgVnWsyaznd5

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Sets DLL path for service in the registry 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0a1df81fa676026fcf4fc52d5dce5316.exe
    "C:\Users\Admin\AppData\Local\Temp\0a1df81fa676026fcf4fc52d5dce5316.exe"
    1⤵
    • Sets DLL path for service in the registry
    • Drops file in System32 directory
    PID:2216
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k netsvcs
    1⤵
    • Deletes itself
    • Loads dropped DLL
    PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \??\c:\windows\SysWOW64\dllcache\ntser.dll

    Filesize

    103KB

    MD5

    56607c05f6afcb744097e971a37ced33

    SHA1

    4ef7d7387da1affae0cdb1988d489c05e2679538

    SHA256

    eea240b7c58c9413a4009497315a3468b9995bf7830fc911871e724a3ecafc77

    SHA512

    aecfbcbe9d33264eb8b49b65080a5d9ea09f7e2f3332b4bed8c4e4e8fe12ee8902302685c128033f797ed8f1c9ee44d8cc509138e7e693e61d3975285203671a

  • memory/2184-4-0x0000000010000000-0x000000001001C000-memory.dmp

    Filesize

    112KB

  • memory/2216-0-0x0000000000400000-0x000000000041F000-memory.dmp

    Filesize

    124KB