Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:44
Static task
static1
Behavioral task
behavioral1
Sample
11582d5b304618a72758a284988f5bcd.exe
Resource
win7-20231215-en
General
-
Target
11582d5b304618a72758a284988f5bcd.exe
-
Size
252KB
-
MD5
11582d5b304618a72758a284988f5bcd
-
SHA1
629ec287cfaaf107e83a35ce7ebba8534049ec16
-
SHA256
dab7dec1dc8dc829d8d76ccc061f3789ef22195dd008d89755b2a4e02b6ce028
-
SHA512
37679646039a5e09192b83ddb31325fbef69c31b1e768fde0a0dba221badea4aff5e3cae60eafc18ccd27e673f80cd553154d4626401a532698c4f4a067b0538
-
SSDEEP
6144:SxprF/c5ANnj62gRFXV44colzQ9c6p2ItBDj+ZOYF:qp5/cq9QhIoS9VfDjEOa
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2976-10-0x0000000010000000-0x0000000010031000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2720 ggmiuy.exe -
Drops file in System32 directory 10 IoCs
description ioc Process File created C:\Windows\SysWOW64\vir8.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir9.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir0.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir3.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir5.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir6.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir1.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir2.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir4.exe ggmiuy.exe File created C:\Windows\SysWOW64\vir7.exe ggmiuy.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ggmiuy.exe 11582d5b304618a72758a284988f5bcd.exe File opened for modification C:\Windows\ggmiuy.exe 11582d5b304618a72758a284988f5bcd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2976 11582d5b304618a72758a284988f5bcd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11582d5b304618a72758a284988f5bcd.exe"C:\Users\Admin\AppData\Local\Temp\11582d5b304618a72758a284988f5bcd.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
C:\Windows\ggmiuy.exeC:\Windows\ggmiuy.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2720
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD56df2c27e2ea650196a35f6d665cd0de0
SHA18b88e52e699c0ee4c9fa92a40218f2bb8afd9d81
SHA2563124d09c87b0750786469892668b89b18704acf9bf40c7c73c98db152569783d
SHA512ee6cc7da6b35deeda16074cebc7a8f71693957b228c56f3875e4b508c541700332e599dd84e12ac48b4f80ebe66538496cd4414a8880e3355b7bad273611b0f5
-
Filesize
252KB
MD511582d5b304618a72758a284988f5bcd
SHA1629ec287cfaaf107e83a35ce7ebba8534049ec16
SHA256dab7dec1dc8dc829d8d76ccc061f3789ef22195dd008d89755b2a4e02b6ce028
SHA51237679646039a5e09192b83ddb31325fbef69c31b1e768fde0a0dba221badea4aff5e3cae60eafc18ccd27e673f80cd553154d4626401a532698c4f4a067b0538