Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe
Resource
win10v2004-20231215-en
General
-
Target
0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe
-
Size
372KB
-
MD5
3b9e3e850933caa9003654132483c904
-
SHA1
c0dd579af79831b5b6ae5e0926f990d992143525
-
SHA256
c175bbf9c53bb397bf54555e30f34b9ee069682d71301e01dd8bda74615e58eb
-
SHA512
1329cf083a89ea16983d54b09e720c9d22e9718f2f0ff5c3266aabd4fd6841bc467dd620fa429d9d244bdea7d19e3533ff98c7203c8310e9a1f4f4b8187e80b2
-
SSDEEP
3072:fIXcNc8ES3qngZt/ET+rL+aIy8dGv5FqEPPVG5ZGsnWznKr/00:fIMNc8ESDZVLACbP05Uaxc0
Malware Config
Extracted
gh0strat
182.42.105.12
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/1936-0-0x0000000010000000-0x0000000010017000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 2824 Terms.exe 2156 Terms.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Terms.exe 0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe File opened for modification C:\Program Files (x86)\Terms.exe 0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1936 0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2156 2824 Terms.exe 29 PID 2824 wrote to memory of 2156 2824 Terms.exe 29 PID 2824 wrote to memory of 2156 2824 Terms.exe 29 PID 2824 wrote to memory of 2156 2824 Terms.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe"C:\Users\Admin\AppData\Local\Temp\0b4eb7fdae7e90c0bd0dbfc7552865ba6d7dcd03e77efd91b5e246c71f9f2f7c.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: RenamesItself
PID:1936
-
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Program Files (x86)\Terms.exe"C:\Program Files (x86)\Terms.exe" Win72⤵
- Executes dropped EXE
PID:2156
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD53b9e3e850933caa9003654132483c904
SHA1c0dd579af79831b5b6ae5e0926f990d992143525
SHA256c175bbf9c53bb397bf54555e30f34b9ee069682d71301e01dd8bda74615e58eb
SHA5121329cf083a89ea16983d54b09e720c9d22e9718f2f0ff5c3266aabd4fd6841bc467dd620fa429d9d244bdea7d19e3533ff98c7203c8310e9a1f4f4b8187e80b2