Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    152s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 05:39

General

  • Target

    1032a3ed090f9abba2c1cba5f8412764.exe

  • Size

    143KB

  • MD5

    1032a3ed090f9abba2c1cba5f8412764

  • SHA1

    fb287a0a8a222221a9042f0b8ae52174b09ebb71

  • SHA256

    3a5d187a32e724419e9f09e614e24d2d16a68bfe30dff50c377a1e9286d219a9

  • SHA512

    652a75b4eae898980a643e09989869e5b3552f326df3582966f057dd1d9856915a198bcaac458b1f7766520eb2698f040964dc10478a5a65195b157cf0f70b15

  • SSDEEP

    3072:C69iSZOmD27rRavfCCY8feFgtV4dfFO5pctyhUeqovd3B3E:C/Sc1oykcFu3hUeqoJB0

Score
10/10

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1032a3ed090f9abba2c1cba5f8412764.exe
    "C:\Users\Admin\AppData\Local\Temp\1032a3ed090f9abba2c1cba5f8412764.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:4780
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k imgsvc
    1⤵
    • Deletes itself
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    PID:3284

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\348900.dll

    Filesize

    101KB

    MD5

    ca3d84abd2632b1575c754b4404ec695

    SHA1

    6657872f3b828024bd2bee272cbcf34448e0ca53

    SHA256

    cb6e3f4a37bd4dde1ad468cc588f5d30a58ba2f91851ddfea4a5b96c06b3344f

    SHA512

    f894f8feca666629a05334f22e77b96137160be867e6250dca6adbe08e845f708506792afe735e4b890b87402b26065f4759b2a111d62856e008a670646f1978

  • \??\c:\NT_Path.jpg

    Filesize

    84B

    MD5

    aa67349aedc4d7839fc68db94638143f

    SHA1

    e49542b29f061106a6d523e9f0f7e75f41793ebd

    SHA256

    faabb28af64d10b86d2fe776e173825e91cfc9741aa93b73fba8898830dbb582

    SHA512

    bda6d3363c96d8b9deccad6e3bd4d3d9e4983ef05442be25cee9e880acab0e1f7a7731283447946e92986b67a5ca2de84ad9c0f742d0525b6667f3da04ef9ddc

  • \??\c:\windows\123.jpg

    Filesize

    10.4MB

    MD5

    780891b3fb58a00290bd2208941e5c90

    SHA1

    44c9406f508a58ba9c7217c9ed2928c373b27c2a

    SHA256

    cecf7d750a85da5bc85bd4d5cafe1ff7b2c3d87d444b39a6e1550e52fc968eaf

    SHA512

    e680854803b20084b511a42389455b36e97c9e6a091f89351d26f0182e36ae519cae7ccac96f77cc1b82f9d67492e7dbcac7d7e3a75de388f8102ddaa3703fbd

  • memory/4780-2-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB