Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/01/2024, 18:35
Behavioral task
behavioral1
Sample
7815ab056a32f1b03796e108dcfad193.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7815ab056a32f1b03796e108dcfad193.exe
Resource
win10v2004-20231215-en
General
-
Target
7815ab056a32f1b03796e108dcfad193.exe
-
Size
1.1MB
-
MD5
7815ab056a32f1b03796e108dcfad193
-
SHA1
17f3976e05bdb83ec27458575f3d9156e83163f0
-
SHA256
ea6be1e68cb43168dae51eb1fb36b44f8b0cdaa2efe5a5929dae4af2cc404948
-
SHA512
7dbf6e9db5ad14ebe87eacb5a01401e03a6447977eba6e285dd635148d12bc36bda166e25cc9814d22fba6563ac786b82b525a5f4b4b58a497ae4482323a84e6
-
SSDEEP
12288:iM5jZKbBL3aKHx5r+TuxX+fWbwFBfdGmZZt:iM5j8Z3aKHx5r+TuxX+IwffFZZt
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x000b000000015610-4.dat family_gh0strat -
Executes dropped EXE 1 IoCs
pid Process 2796 svchest001465662051.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Kris = "c:\\Windows\\notepab.exe" 7815ab056a32f1b03796e108dcfad193.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created \??\c:\Windows\svchest001465662051.exe 7815ab056a32f1b03796e108dcfad193.exe File opened for modification \??\c:\Windows\svchest001465662051.exe 7815ab056a32f1b03796e108dcfad193.exe File created \??\c:\Windows\notepab.exe 7815ab056a32f1b03796e108dcfad193.exe File created \??\c:\Windows\BJ.exe 7815ab056a32f1b03796e108dcfad193.exe File opened for modification \??\c:\Windows\BJ.exe 7815ab056a32f1b03796e108dcfad193.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2796 2436 7815ab056a32f1b03796e108dcfad193.exe 28 PID 2436 wrote to memory of 2796 2436 7815ab056a32f1b03796e108dcfad193.exe 28 PID 2436 wrote to memory of 2796 2436 7815ab056a32f1b03796e108dcfad193.exe 28 PID 2436 wrote to memory of 2796 2436 7815ab056a32f1b03796e108dcfad193.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\7815ab056a32f1b03796e108dcfad193.exe"C:\Users\Admin\AppData\Local\Temp\7815ab056a32f1b03796e108dcfad193.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2436 -
\??\c:\Windows\svchest001465662051.exec:\Windows\svchest001465662051.exe2⤵
- Executes dropped EXE
PID:2796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD57815ab056a32f1b03796e108dcfad193
SHA117f3976e05bdb83ec27458575f3d9156e83163f0
SHA256ea6be1e68cb43168dae51eb1fb36b44f8b0cdaa2efe5a5929dae4af2cc404948
SHA5127dbf6e9db5ad14ebe87eacb5a01401e03a6447977eba6e285dd635148d12bc36bda166e25cc9814d22fba6563ac786b82b525a5f4b4b58a497ae4482323a84e6