Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 19:14
Behavioral task
behavioral1
Sample
016a3028231ea50250e5518bb9809547.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
016a3028231ea50250e5518bb9809547.exe
Resource
win10v2004-20231215-en
General
-
Target
016a3028231ea50250e5518bb9809547.exe
-
Size
506KB
-
MD5
016a3028231ea50250e5518bb9809547
-
SHA1
d6f938aaac8973a1a5f9aa9f3c83962905102d5d
-
SHA256
5425973692b675f1ffdb5638ab2e0a3ce0a08dadf43086f5accc469303c39cfe
-
SHA512
82782c0d2f8f41aed9678d19029f1f28376d08f79345d9bbc2436c02ac547f3c1af81ac23fe47f364dc74cec81078ea55b40bd6abe3dab0520a6410f359d5c6d
-
SSDEEP
12288:+08PKZVQQxfnr+TK7r79/J0NWNf37JcAayM5ahpnq5:p8AVQQxfnr+TK7r79/J0ofrJEyM5ahxY
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000a00000001225c-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2756 (null)0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\016a3028231ea50250e5518bb9809547.exe" 016a3028231ea50250e5518bb9809547.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created \??\c:\Windows\(null)0.exe 016a3028231ea50250e5518bb9809547.exe File created \??\c:\Windows\BJ.exe 016a3028231ea50250e5518bb9809547.exe File opened for modification \??\c:\Windows\BJ.exe 016a3028231ea50250e5518bb9809547.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2756 1216 016a3028231ea50250e5518bb9809547.exe 28 PID 1216 wrote to memory of 2756 1216 016a3028231ea50250e5518bb9809547.exe 28 PID 1216 wrote to memory of 2756 1216 016a3028231ea50250e5518bb9809547.exe 28 PID 1216 wrote to memory of 2756 1216 016a3028231ea50250e5518bb9809547.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\016a3028231ea50250e5518bb9809547.exe"C:\Users\Admin\AppData\Local\Temp\016a3028231ea50250e5518bb9809547.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1216 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:2756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
506KB
MD5016a3028231ea50250e5518bb9809547
SHA1d6f938aaac8973a1a5f9aa9f3c83962905102d5d
SHA2565425973692b675f1ffdb5638ab2e0a3ce0a08dadf43086f5accc469303c39cfe
SHA51282782c0d2f8f41aed9678d19029f1f28376d08f79345d9bbc2436c02ac547f3c1af81ac23fe47f364dc74cec81078ea55b40bd6abe3dab0520a6410f359d5c6d