Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 11:44
Behavioral task
behavioral1
Sample
58d6de2c467933f405ae2fc1d8e36a3b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58d6de2c467933f405ae2fc1d8e36a3b.exe
Resource
win10v2004-20231215-en
General
-
Target
58d6de2c467933f405ae2fc1d8e36a3b.exe
-
Size
361KB
-
MD5
58d6de2c467933f405ae2fc1d8e36a3b
-
SHA1
9ef527fde74c857c4339b1e7d5dc1aa61ba79933
-
SHA256
9bd198d3ef90bcb68ffad354bdd40fc4b624b557702e73715ef677bb38f75a2c
-
SHA512
4aff3004affcd5c3a1d5938bcbf98d5bbc5a2b1349e59e98a6af5811b97fa82c1e706ff62e76f58ed006b8bc9cb1f57239d7f98bf1cebcde3032b55aadef1a67
-
SSDEEP
6144:TGzRxSVtp0l6whGfsKR+zkBpTaa5tJHeZ:St0VPFfsKAkrbPleZ
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/3044-11-0x0000000000400000-0x00000000004F0000-memory.dmp family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 3044 (null)0.exe -
resource yara_rule behavioral1/memory/2388-0-0x0000000000400000-0x00000000004F0000-memory.dmp upx behavioral1/memory/2388-9-0x00000000004F0000-0x00000000005E0000-memory.dmp upx behavioral1/files/0x000c0000000153ba-8.dat upx behavioral1/memory/3044-11-0x0000000000400000-0x00000000004F0000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "C:\\Users\\Admin\\AppData\\Local\\Temp\\58d6de2c467933f405ae2fc1d8e36a3b.exe" 58d6de2c467933f405ae2fc1d8e36a3b.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification \??\c:\Windows\BJ.exe 58d6de2c467933f405ae2fc1d8e36a3b.exe File created \??\c:\Windows\(null)0.exe 58d6de2c467933f405ae2fc1d8e36a3b.exe File created \??\c:\Windows\BJ.exe 58d6de2c467933f405ae2fc1d8e36a3b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2388 wrote to memory of 3044 2388 58d6de2c467933f405ae2fc1d8e36a3b.exe 28 PID 2388 wrote to memory of 3044 2388 58d6de2c467933f405ae2fc1d8e36a3b.exe 28 PID 2388 wrote to memory of 3044 2388 58d6de2c467933f405ae2fc1d8e36a3b.exe 28 PID 2388 wrote to memory of 3044 2388 58d6de2c467933f405ae2fc1d8e36a3b.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d6de2c467933f405ae2fc1d8e36a3b.exe"C:\Users\Admin\AppData\Local\Temp\58d6de2c467933f405ae2fc1d8e36a3b.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2388 -
\??\c:\Windows\(null)0.exec:\Windows\(null)0.exe2⤵
- Executes dropped EXE
PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
361KB
MD558d6de2c467933f405ae2fc1d8e36a3b
SHA19ef527fde74c857c4339b1e7d5dc1aa61ba79933
SHA2569bd198d3ef90bcb68ffad354bdd40fc4b624b557702e73715ef677bb38f75a2c
SHA5124aff3004affcd5c3a1d5938bcbf98d5bbc5a2b1349e59e98a6af5811b97fa82c1e706ff62e76f58ed006b8bc9cb1f57239d7f98bf1cebcde3032b55aadef1a67