Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
129s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe
Resource
win7-20231215-en
General
-
Target
cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe
-
Size
374KB
-
MD5
6c2c08f590997758a68212c53ffc2f0c
-
SHA1
e6878c8da32a8e4a1f41b0551df980a36f897f42
-
SHA256
cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351
-
SHA512
5153737d6290bb6cff4bb1e237a8d3a20603c7e69eec8af6999092c81f13976d43bcc910ab5c77fa887c7b96182efb065137541235f50d354aa099b97b8502a5
-
SSDEEP
6144:NjO+L1Czkq7KTW1Dl/saQ9rtYm3okqoBSpH50KcddsVRZdaiYviQJqOC5cpQwmB:ZMzpOTY+JzYmE7R55udm7U5JTqwe
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2896-3-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral1/memory/2896-4-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral1/memory/2896-11-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral1/memory/3024-17-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit behavioral1/memory/3024-22-0x0000000010000000-0x00000000101A9000-memory.dmp purplefox_rootkit -
Gh0st RAT payload 7 IoCs
resource yara_rule behavioral1/memory/2896-2-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral1/memory/2896-3-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral1/memory/2896-4-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral1/memory/2896-11-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral1/memory/3024-15-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral1/memory/3024-17-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat behavioral1/memory/3024-22-0x0000000010000000-0x00000000101A9000-memory.dmp family_gh0strat -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\QAssist.sys Jklde.exe -
Deletes itself 1 IoCs
pid Process 1324 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3024 Jklde.exe -
Loads dropped DLL 1 IoCs
pid Process 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe -
resource yara_rule behavioral1/memory/2896-0-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/2896-2-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/2896-3-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/2896-4-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/2896-11-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/3024-15-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/3024-17-0x0000000010000000-0x00000000101A9000-memory.dmp upx behavioral1/memory/3024-22-0x0000000010000000-0x00000000101A9000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2808 PING.EXE -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe Token: 33 3024 Jklde.exe Token: SeIncBasePriorityPrivilege 3024 Jklde.exe Token: 33 3024 Jklde.exe Token: SeIncBasePriorityPrivilege 3024 Jklde.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3024 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 29 PID 2896 wrote to memory of 3024 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 29 PID 2896 wrote to memory of 3024 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 29 PID 2896 wrote to memory of 3024 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 29 PID 2896 wrote to memory of 1324 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 28 PID 2896 wrote to memory of 1324 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 28 PID 2896 wrote to memory of 1324 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 28 PID 2896 wrote to memory of 1324 2896 cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe 28 PID 1324 wrote to memory of 2808 1324 cmd.exe 31 PID 1324 wrote to memory of 2808 1324 cmd.exe 31 PID 1324 wrote to memory of 2808 1324 cmd.exe 31 PID 1324 wrote to memory of 2808 1324 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe"C:\Users\Admin\AppData\Local\Temp\cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\CF58B2~1.EXE > nul2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2808
-
-
-
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Jklde.exe"C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\Jklde.exe"2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
374KB
MD56c2c08f590997758a68212c53ffc2f0c
SHA1e6878c8da32a8e4a1f41b0551df980a36f897f42
SHA256cf58b207bf60574254b7bce9f588a36fa9d2466128403c3d1eb8b85f1be84351
SHA5125153737d6290bb6cff4bb1e237a8d3a20603c7e69eec8af6999092c81f13976d43bcc910ab5c77fa887c7b96182efb065137541235f50d354aa099b97b8502a5