Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 05:09
Behavioral task
behavioral1
Sample
296a42fef32dcaaf2098ee66b8b00356.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
296a42fef32dcaaf2098ee66b8b00356.exe
Resource
win10v2004-20231215-en
General
-
Target
296a42fef32dcaaf2098ee66b8b00356.exe
-
Size
666KB
-
MD5
296a42fef32dcaaf2098ee66b8b00356
-
SHA1
50e4b6b021bb241ee6e0ac7781a4ca8886c3cf89
-
SHA256
eae1eb28d8b4ee8c7b658e22aa688a56716ee30c6d2957ce0f6fc2eb18836204
-
SHA512
38c255c288218ccf14d00a1d4ecf3122e03849fbdf096d3da7633337a6304eaa36b1358878f0a03ce75a90e1b6b535f7bc820a81a07412e3cc0f08447620738b
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZNr:iM5j8Z3aKHx5r+TuxX+IwffFZNr
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000a000000012266-6.dat family_gh0strat behavioral1/files/0x000a000000012266-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2404 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 296a42fef32dcaaf2098ee66b8b00356.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 296a42fef32dcaaf2098ee66b8b00356.exe File opened for modification \??\c:\Windows\BJ.exe 296a42fef32dcaaf2098ee66b8b00356.exe File created \??\c:\Windows\svchest001465662051.exe 296a42fef32dcaaf2098ee66b8b00356.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 296a42fef32dcaaf2098ee66b8b00356.exe File created \??\c:\Windows\notepab.exe 296a42fef32dcaaf2098ee66b8b00356.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2404 2132 296a42fef32dcaaf2098ee66b8b00356.exe 16 PID 2132 wrote to memory of 2404 2132 296a42fef32dcaaf2098ee66b8b00356.exe 16 PID 2132 wrote to memory of 2404 2132 296a42fef32dcaaf2098ee66b8b00356.exe 16 PID 2132 wrote to memory of 2404 2132 296a42fef32dcaaf2098ee66b8b00356.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\296a42fef32dcaaf2098ee66b8b00356.exe"C:\Users\Admin\AppData\Local\Temp\296a42fef32dcaaf2098ee66b8b00356.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2132 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD59f0fe7c7e78919befdc031aeb3da94b5
SHA13ddca684be2ed0e9cc0ca14b2a1d97b9446f529e
SHA2562cfc611aa1c25b9887d9025efcde47559f62cda4204203f845ea6fd0dfbc9bfc
SHA512b2ce46997ecbdf6316dd24eba9211c152566b967607029606ba69cdcd55ae3f7c006effbd88c78d9601c352dce097d083a8d07f553133e18e079ba31f1e11a0a
-
Filesize
217KB
MD5bf7d757749861a5641078b19ce51dd85
SHA19cff978093c41d0324a8a0f625c01507f20befbb
SHA256f9f11f4dc7ac7df5beadeb97ac9ee062370f2b7d5a817e644460f72b5a9e0d90
SHA5120de16af405b914e78e26a54e13fa56b70e4c98eec05466e39d9a100a3cfe92ed30448f205c5366f05c672279f81570b993284a55fbc2f97e79ca8751b9b11838