Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 22:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbe102e14ad5428f3481f89861738c85.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
fbe102e14ad5428f3481f89861738c85.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
fbe102e14ad5428f3481f89861738c85.exe
-
Size
75KB
-
MD5
fbe102e14ad5428f3481f89861738c85
-
SHA1
0cb468af61d9c751fb865cc4c269c7c076fe7a0a
-
SHA256
65f90802cd7476bc9338da8c4a31a407a7b6889a81c82bb778e2487145d76e98
-
SHA512
e7c6905c2c8f1c1b93ca3fc66092871140d143cbccd9d10cf790cc3ed1cbde272cec0283b3070cceff0794444ff9f18ca7faaf5f8ec8d5e34e1add97e7aa0838
-
SSDEEP
1536:aW8rGHOgdVGH3bIjH6b0wwPz+pejkLwwPjRcdj0uBC0VZwGQIz:aFrgLVGH3bC6Qq0gUecdj0u9OIz
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2924-6-0x0000000010000000-0x0000000010045000-memory.dmp family_gh0strat behavioral1/memory/2924-4-0x0000000010000000-0x0000000010045000-memory.dmp family_gh0strat behavioral1/memory/2924-3-0x0000000010000000-0x0000000010045000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Config = "C:\\Windows\\Config\\svchsot.exe" fbe102e14ad5428f3481f89861738c85.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2924 fbe102e14ad5428f3481f89861738c85.exe 2924 fbe102e14ad5428f3481f89861738c85.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 fbe102e14ad5428f3481f89861738c85.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2924 fbe102e14ad5428f3481f89861738c85.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2788 2924 fbe102e14ad5428f3481f89861738c85.exe 23 PID 2924 wrote to memory of 2788 2924 fbe102e14ad5428f3481f89861738c85.exe 23 PID 2924 wrote to memory of 2788 2924 fbe102e14ad5428f3481f89861738c85.exe 23 PID 2924 wrote to memory of 2788 2924 fbe102e14ad5428f3481f89861738c85.exe 23 PID 2788 wrote to memory of 3064 2788 net.exe 21 PID 2788 wrote to memory of 3064 2788 net.exe 21 PID 2788 wrote to memory of 3064 2788 net.exe 21 PID 2788 wrote to memory of 3064 2788 net.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe102e14ad5428f3481f89861738c85.exe"C:\Users\Admin\AppData\Local\Temp\fbe102e14ad5428f3481f89861738c85.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:2788
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"1⤵PID:3064