Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
7d355265faef465587580732d8401886.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d355265faef465587580732d8401886.exe
Resource
win10v2004-20231222-en
General
-
Target
7d355265faef465587580732d8401886.exe
-
Size
148KB
-
MD5
7d355265faef465587580732d8401886
-
SHA1
0c64fa523ebf294cbe7e43267dbc7e0f9534b15a
-
SHA256
7f90d34e5154e6b3be192629776dd556785799a62b74ec816bfd2d0caf82a06b
-
SHA512
5807a293860b85a1faad2c51f9b21366e42f582d2adbb49ef4900d9090eb70625c8001c21aa9881b2ed4549670acf96b4fadbaf9816e3e7ce29b79ec8d2a472e
-
SSDEEP
3072:lhT2137DYmJRJKph0QinoLKY6rlmkrylwdxMnoRvsiKm5NHVMSGkN:lhRqJkLLgrl8ltnbi5N1MSG6
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral1/files/0x000c000000013a83-7.dat family_gh0strat behavioral1/memory/2676-9-0x0000000000400000-0x0000000000436000-memory.dmp family_gh0strat behavioral1/memory/2676-15-0x0000000000400000-0x0000000000436000-memory.dmp family_gh0strat behavioral1/files/0x0007000000016cf2-12.dat family_gh0strat -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14F88B9F-B9F7-4678-A33C-807A8C4DE95A} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{14F88B9F-B9F7-4678-A33C-807A8C4DE95A}\stubpath = "C:\\Windows\\system32\\innfvgrkz.exe" windows.exe -
Executes dropped EXE 1 IoCs
pid Process 2676 windows.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\innfvgrkz.exe windows.exe File opened for modification C:\Windows\SysWOW64\innfvgrkz.exe_lang.ini windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 windows.exe 2676 windows.exe -
Suspicious behavior: MapViewOfSection 22 IoCs
pid Process 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe 2676 windows.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2676 windows.exe Token: SeDebugPrivilege 2676 windows.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2464 DllHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 1780 wrote to memory of 2676 1780 7d355265faef465587580732d8401886.exe 29 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 388 2676 windows.exe 5 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 400 2676 windows.exe 4 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 436 2676 windows.exe 3 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 480 2676 windows.exe 2 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 496 2676 windows.exe 1 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 504 2676 windows.exe 22 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 604 2676 windows.exe 8 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 680 2676 windows.exe 21 PID 2676 wrote to memory of 744 2676 windows.exe 9
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:496
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:480
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:604
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}3⤵PID:272
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}3⤵
- Suspicious use of FindShellTrayWindow
PID:2464
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:868
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1084
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1124
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:288
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:980
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:824
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:680
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:2284
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:2152
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:436
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:400
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:388
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:504
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\7d355265faef465587580732d8401886.exe"C:\Users\Admin\AppData\Local\Temp\7d355265faef465587580732d8401886.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\windows.exe"C:\windows.exe"3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676
-
-
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD56405f96ed58ef1571f16d3c843e9db4b
SHA18cdbb88da5997469313fa916293e2165de22e09f
SHA256c96871712ce455d34ca3ea92e8293a41cfe831ca08115514a16bec9bf578d16f
SHA5123a9ad70709ff814bd5b810e062de6b92a06e263277090b1dcfb32cfa347c6fa253bb2da98d12286434d563ca1dff0563815d7877b8ecde6136e2afa21ff4ce37
-
Filesize
201KB
MD502d4c9a92b4d17cec860b4d6089d7453
SHA11f43da3736724fbc13c54120369484f7dbe59290
SHA256afc33ff93923983c4d4d70281cc840b7de3d99e070a280f5376082b529eb211a
SHA512de931cca11ed7181f395258eb3bef65aae301a97357311eceea331ea4d23970519bd812b6eca85718a0779119eac5b429193fec2a47951bcb02210b08339c34e
-
Filesize
5KB
MD5e137ffb2fa274f01ef796d149e990c49
SHA19d87efa338fc6f9130de0180e66040761fa90de8
SHA2564cd705e0bba9c3867f529e06a01154c1d29963fde157ddce90e6fe7b39122c4b
SHA51249ab6fccfd3381797dd37517368e1c2d0aabbe9a636476d7e4e4d862bb61784d52111ed2b1f10ccdef88d7fb7f085773db1dc847938ffa3ef1cb949e025c2a2b