Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 18:55
Behavioral task
behavioral1
Sample
360e24b8c530821239bf751fb43b4cde.exe
Resource
win7-20231129-en
12 signatures
150 seconds
General
-
Target
360e24b8c530821239bf751fb43b4cde.exe
-
Size
196KB
-
MD5
360e24b8c530821239bf751fb43b4cde
-
SHA1
76c5e7b061de6a8968f5ba2de6a97bb636330e59
-
SHA256
7bfc9dbf2eac45bda0976334d99f6355d0468817f3247b2e235ec11df7d62d5e
-
SHA512
e1981fa4e98a079e76a9e2aa099d294cfad72641fe99f2f9352741c4f5127596283a123cb5c078f00ed4e6e58d9ad2ea3fe830d6ff4f106c1d508d0cb6b22946
-
SSDEEP
6144:osIt6nW8QWBTyPRqyhYPbncTBlhHrtndnkv0:t9W8CJq8YPbncT30
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral2/files/0x0008000000023217-4.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 3160 goxsjvtnpx -
Executes dropped EXE 1 IoCs
pid Process 3160 goxsjvtnpx -
Loads dropped DLL 3 IoCs
pid Process 4832 svchost.exe 2452 svchost.exe 4924 svchost.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\olispslyuw svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\otwlxvnvir svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe File created C:\Windows\SysWOW64\otwlxvnvir svchost.exe File opened for modification C:\Windows\SysWOW64\svchost.exe.txt svchost.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3252 4832 WerFault.exe 95 3520 2452 WerFault.exe 98 4692 4924 WerFault.exe 100 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3160 goxsjvtnpx 3160 goxsjvtnpx -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeRestorePrivilege 3160 goxsjvtnpx Token: SeBackupPrivilege 3160 goxsjvtnpx Token: SeBackupPrivilege 3160 goxsjvtnpx Token: SeRestorePrivilege 3160 goxsjvtnpx Token: SeBackupPrivilege 4832 svchost.exe Token: SeRestorePrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeSecurityPrivilege 4832 svchost.exe Token: SeBackupPrivilege 4832 svchost.exe Token: SeRestorePrivilege 4832 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeRestorePrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeSecurityPrivilege 2452 svchost.exe Token: SeSecurityPrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeSecurityPrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeSecurityPrivilege 2452 svchost.exe Token: SeBackupPrivilege 2452 svchost.exe Token: SeRestorePrivilege 2452 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeRestorePrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeSecurityPrivilege 4924 svchost.exe Token: SeSecurityPrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeSecurityPrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeSecurityPrivilege 4924 svchost.exe Token: SeBackupPrivilege 4924 svchost.exe Token: SeRestorePrivilege 4924 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4984 wrote to memory of 3160 4984 360e24b8c530821239bf751fb43b4cde.exe 45 PID 4984 wrote to memory of 3160 4984 360e24b8c530821239bf751fb43b4cde.exe 45 PID 4984 wrote to memory of 3160 4984 360e24b8c530821239bf751fb43b4cde.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\360e24b8c530821239bf751fb43b4cde.exe"C:\Users\Admin\AppData\Local\Temp\360e24b8c530821239bf751fb43b4cde.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
\??\c:\users\admin\appdata\local\goxsjvtnpx"C:\Users\Admin\AppData\Local\Temp\360e24b8c530821239bf751fb43b4cde.exe" a -sc:\users\admin\appdata\local\temp\360e24b8c530821239bf751fb43b4cde.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3160
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4832 -s 9562⤵
- Program crash
PID:3252
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4832 -ip 48321⤵PID:2768
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 7842⤵
- Program crash
PID:3520
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s fastuserswitchingcompatibility1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 10922⤵
- Program crash
PID:4692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 552 -p 2452 -ip 24521⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 588 -p 4924 -ip 49241⤵PID:2332