Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 19:42
Behavioral task
behavioral1
Sample
3ae371fbd25b2c9cac0113225b423518.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3ae371fbd25b2c9cac0113225b423518.exe
Resource
win10v2004-20231215-en
General
-
Target
3ae371fbd25b2c9cac0113225b423518.exe
-
Size
636KB
-
MD5
3ae371fbd25b2c9cac0113225b423518
-
SHA1
5c2c8503f3ab0baf69a68e3d732c31f02dc8f1ab
-
SHA256
50d1e6f40ec1c0d3b28b4c91a34a5c8c9d4b6166b17c7280b7fa1781675ee0a3
-
SHA512
836164cfd5c64ecf4a8bbb525961dc71e6b06c74cac2c49f2b016674ce3f48ad6c28c089a122fea0374892e8d153598d0eb8fd4d749817889d7b3d0b8443a799
-
SSDEEP
12288:m/eC0vZVQQxfnr+TK7r79/JenWAG36ATphjM5Bfc:m/XwVQQxfnr+TK7r79/Je3GqArjM5Bfc
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/files/0x000b0000000144ac-6.dat family_gh0strat behavioral1/files/0x000b0000000144ac-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 1656 svchest000.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 3ae371fbd25b2c9cac0113225b423518.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\BJ.exe 3ae371fbd25b2c9cac0113225b423518.exe File opened for modification \??\c:\Windows\BJ.exe 3ae371fbd25b2c9cac0113225b423518.exe File created \??\c:\Windows\svchest000.exe 3ae371fbd25b2c9cac0113225b423518.exe File opened for modification \??\c:\Windows\svchest000.exe 3ae371fbd25b2c9cac0113225b423518.exe File created \??\c:\Windows\notepab.exe 3ae371fbd25b2c9cac0113225b423518.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2088 wrote to memory of 1656 2088 3ae371fbd25b2c9cac0113225b423518.exe 17 PID 2088 wrote to memory of 1656 2088 3ae371fbd25b2c9cac0113225b423518.exe 17 PID 2088 wrote to memory of 1656 2088 3ae371fbd25b2c9cac0113225b423518.exe 17 PID 2088 wrote to memory of 1656 2088 3ae371fbd25b2c9cac0113225b423518.exe 17
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ae371fbd25b2c9cac0113225b423518.exe"C:\Users\Admin\AppData\Local\Temp\3ae371fbd25b2c9cac0113225b423518.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\Windows\svchest000.exec:\Windows\svchest000.exe2⤵
- Executes dropped EXE
PID:1656
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5257c2eb1237f3c7dfbbf16489b130eed
SHA1d2b8d6c8f7b72753a3f78ae08e7bc2d0f8ceaa6f
SHA25639181b4e1fcb0df35ce1218ed05d75053c95cca0b5d230a05836c5c902476e88
SHA512ff32672334214795cbbc0cd640a62a0a15e4346f5595a7d0792528b7c8aec043f8a67cd0be128f1b61121515f454a596e54a6994f81f27b0ebe6256dc5ab7b26