Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 22:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
fbe102e14ad5428f3481f89861738c85.exe
Resource
win7-20231129-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
fbe102e14ad5428f3481f89861738c85.exe
Resource
win10v2004-20231215-en
8 signatures
150 seconds
General
-
Target
fbe102e14ad5428f3481f89861738c85.exe
-
Size
75KB
-
MD5
fbe102e14ad5428f3481f89861738c85
-
SHA1
0cb468af61d9c751fb865cc4c269c7c076fe7a0a
-
SHA256
65f90802cd7476bc9338da8c4a31a407a7b6889a81c82bb778e2487145d76e98
-
SHA512
e7c6905c2c8f1c1b93ca3fc66092871140d143cbccd9d10cf790cc3ed1cbde272cec0283b3070cceff0794444ff9f18ca7faaf5f8ec8d5e34e1add97e7aa0838
-
SSDEEP
1536:aW8rGHOgdVGH3bIjH6b0wwPz+pejkLwwPjRcdj0uBC0VZwGQIz:aFrgLVGH3bC6Qq0gUecdj0u9OIz
Score
10/10
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/1652-2-0x0000000010000000-0x0000000010045000-memory.dmp family_gh0strat behavioral2/memory/1652-6-0x0000000010000000-0x0000000010045000-memory.dmp family_gh0strat behavioral2/memory/1652-4-0x0000000010000000-0x0000000010045000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Config = "C:\\Windows\\Config\\svchsot.exe" fbe102e14ad5428f3481f89861738c85.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1652 fbe102e14ad5428f3481f89861738c85.exe 1652 fbe102e14ad5428f3481f89861738c85.exe 1652 fbe102e14ad5428f3481f89861738c85.exe 1652 fbe102e14ad5428f3481f89861738c85.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 fbe102e14ad5428f3481f89861738c85.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1652 fbe102e14ad5428f3481f89861738c85.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1652 wrote to memory of 4668 1652 fbe102e14ad5428f3481f89861738c85.exe 24 PID 1652 wrote to memory of 4668 1652 fbe102e14ad5428f3481f89861738c85.exe 24 PID 1652 wrote to memory of 4668 1652 fbe102e14ad5428f3481f89861738c85.exe 24 PID 4668 wrote to memory of 2444 4668 net.exe 27 PID 4668 wrote to memory of 2444 4668 net.exe 27 PID 4668 wrote to memory of 2444 4668 net.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe102e14ad5428f3481f89861738c85.exe"C:\Users\Admin\AppData\Local\Temp\fbe102e14ad5428f3481f89861738c85.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"2⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"3⤵PID:2444
-
-