Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    0s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/12/2023, 12:53

General

  • Target

    1ffa0c7b4481628c4a0e37a7d21a0ea3.exe

  • Size

    358KB

  • MD5

    1ffa0c7b4481628c4a0e37a7d21a0ea3

  • SHA1

    b5f23826c94a73e2a0e7ff16aeb072c221b74092

  • SHA256

    e19fe20c97c4a4fcf65738919d453c2fcd7855dbb5e60f5fefa46ee6ea0002ef

  • SHA512

    5e8b6292dc0e6168a8899e61ad3bc322311cd873f06a2fb4e81a7c9c99c8478b2165301701588bdddf7023d909c97e11bb9fff21ed08874c8c65a8ed366447c0

  • SSDEEP

    6144:/qKne2Ko9cK2OHnV7D2djek72aTALaFIm85ZDOFBjb/8o05NYXafC2IxFRD:v78gnV/2okya+bFOfv8t5NY12GFF

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 15 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ffa0c7b4481628c4a0e37a7d21a0ea3.exe
    "C:\Users\Admin\AppData\Local\Temp\1ffa0c7b4481628c4a0e37a7d21a0ea3.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3620
    • C:\Windows\Terms.EXE.exe
      "C:\Windows\Terms.EXE.exe"
      2⤵
        PID:2964
    • C:\Windows\Terms.EXE.exe
      C:\Windows\Terms.EXE.exe
      1⤵
      • Executes dropped EXE
      PID:3096
      • C:\Windows\Terms.EXE.exe
        C:\Windows\Terms.EXE.exe
        2⤵
          PID:3184
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3096 -s 636
          2⤵
          • Program crash
          PID:4796
        • C:\Windows\Terms.EXE.exe
          C:\Windows\Terms.EXE.exe
          2⤵
            PID:212
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3096 -ip 3096
          1⤵
            PID:2360
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            1⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2964

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/212-50-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/212-48-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/212-49-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/212-45-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/2964-25-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/2964-22-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3096-31-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3096-32-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3096-29-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3096-47-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3096-26-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3184-46-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3620-4-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3620-3-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3620-0-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3620-5-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB

          • memory/3620-7-0x0000000010000000-0x0000000010362000-memory.dmp

            Filesize

            3.4MB