Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28/01/2024, 13:03
Static task
static1
Behavioral task
behavioral1
Sample
7d355265faef465587580732d8401886.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7d355265faef465587580732d8401886.exe
Resource
win10v2004-20231222-en
General
-
Target
7d355265faef465587580732d8401886.exe
-
Size
148KB
-
MD5
7d355265faef465587580732d8401886
-
SHA1
0c64fa523ebf294cbe7e43267dbc7e0f9534b15a
-
SHA256
7f90d34e5154e6b3be192629776dd556785799a62b74ec816bfd2d0caf82a06b
-
SHA512
5807a293860b85a1faad2c51f9b21366e42f582d2adbb49ef4900d9090eb70625c8001c21aa9881b2ed4549670acf96b4fadbaf9816e3e7ce29b79ec8d2a472e
-
SSDEEP
3072:lhT2137DYmJRJKph0QinoLKY6rlmkrylwdxMnoRvsiKm5NHVMSGkN:lhRqJkLLgrl8ltnbi5N1MSG6
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/files/0x00070000000231e3-5.dat family_gh0strat behavioral2/memory/2028-11-0x0000000000400000-0x0000000000436000-memory.dmp family_gh0strat behavioral2/memory/2028-24-0x0000000000400000-0x0000000000436000-memory.dmp family_gh0strat -
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\windows.exe = "C:\\windows.exe:*:enabled:@shell32.dll,-1" windows.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List windows.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile windows.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications windows.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D57E229-92BE-49d8-9EEC-22A7D1253BB4} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7D57E229-92BE-49d8-9EEC-22A7D1253BB4}\stubpath = "C:\\Windows\\system32\\insvxwpco.exe" windows.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 7d355265faef465587580732d8401886.exe -
Executes dropped EXE 1 IoCs
pid Process 2028 windows.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\insvxwpco.exe windows.exe File opened for modification C:\Windows\SysWOW64\insvxwpco.exe_lang.ini windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3596 2028 WerFault.exe 85 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
pid Process 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe 2028 windows.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2028 windows.exe Token: SeDebugPrivilege 2028 windows.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1320 wrote to memory of 2028 1320 7d355265faef465587580732d8401886.exe 85 PID 1320 wrote to memory of 2028 1320 7d355265faef465587580732d8401886.exe 85 PID 1320 wrote to memory of 2028 1320 7d355265faef465587580732d8401886.exe 85 PID 2028 wrote to memory of 616 2028 windows.exe 4 PID 2028 wrote to memory of 616 2028 windows.exe 4 PID 2028 wrote to memory of 616 2028 windows.exe 4 PID 2028 wrote to memory of 616 2028 windows.exe 4 PID 2028 wrote to memory of 616 2028 windows.exe 4 PID 2028 wrote to memory of 616 2028 windows.exe 4 PID 2028 wrote to memory of 672 2028 windows.exe 2 PID 2028 wrote to memory of 672 2028 windows.exe 2 PID 2028 wrote to memory of 672 2028 windows.exe 2 PID 2028 wrote to memory of 672 2028 windows.exe 2 PID 2028 wrote to memory of 672 2028 windows.exe 2 PID 2028 wrote to memory of 672 2028 windows.exe 2 PID 2028 wrote to memory of 756 2028 windows.exe 8 PID 2028 wrote to memory of 756 2028 windows.exe 8 PID 2028 wrote to memory of 756 2028 windows.exe 8 PID 2028 wrote to memory of 756 2028 windows.exe 8 PID 2028 wrote to memory of 756 2028 windows.exe 8 PID 2028 wrote to memory of 756 2028 windows.exe 8 PID 2028 wrote to memory of 760 2028 windows.exe 82 PID 2028 wrote to memory of 760 2028 windows.exe 82 PID 2028 wrote to memory of 760 2028 windows.exe 82 PID 2028 wrote to memory of 760 2028 windows.exe 82 PID 2028 wrote to memory of 760 2028 windows.exe 82 PID 2028 wrote to memory of 760 2028 windows.exe 82 PID 2028 wrote to memory of 788 2028 windows.exe 81 PID 2028 wrote to memory of 788 2028 windows.exe 81 PID 2028 wrote to memory of 788 2028 windows.exe 81 PID 2028 wrote to memory of 788 2028 windows.exe 81 PID 2028 wrote to memory of 788 2028 windows.exe 81 PID 2028 wrote to memory of 788 2028 windows.exe 81 PID 2028 wrote to memory of 908 2028 windows.exe 80 PID 2028 wrote to memory of 908 2028 windows.exe 80 PID 2028 wrote to memory of 908 2028 windows.exe 80 PID 2028 wrote to memory of 908 2028 windows.exe 80 PID 2028 wrote to memory of 908 2028 windows.exe 80 PID 2028 wrote to memory of 908 2028 windows.exe 80 PID 2028 wrote to memory of 956 2028 windows.exe 79 PID 2028 wrote to memory of 956 2028 windows.exe 79 PID 2028 wrote to memory of 956 2028 windows.exe 79 PID 2028 wrote to memory of 956 2028 windows.exe 79 PID 2028 wrote to memory of 956 2028 windows.exe 79 PID 2028 wrote to memory of 956 2028 windows.exe 79 PID 2028 wrote to memory of 60 2028 windows.exe 9 PID 2028 wrote to memory of 60 2028 windows.exe 9 PID 2028 wrote to memory of 60 2028 windows.exe 9 PID 2028 wrote to memory of 60 2028 windows.exe 9 PID 2028 wrote to memory of 60 2028 windows.exe 9 PID 2028 wrote to memory of 60 2028 windows.exe 9 PID 2028 wrote to memory of 392 2028 windows.exe 10 PID 2028 wrote to memory of 392 2028 windows.exe 10 PID 2028 wrote to memory of 392 2028 windows.exe 10 PID 2028 wrote to memory of 392 2028 windows.exe 10 PID 2028 wrote to memory of 392 2028 windows.exe 10 PID 2028 wrote to memory of 392 2028 windows.exe 10 PID 2028 wrote to memory of 652 2028 windows.exe 78 PID 2028 wrote to memory of 652 2028 windows.exe 78 PID 2028 wrote to memory of 652 2028 windows.exe 78 PID 2028 wrote to memory of 652 2028 windows.exe 78 PID 2028 wrote to memory of 652 2028 windows.exe 78 PID 2028 wrote to memory of 652 2028 windows.exe 78 PID 2028 wrote to memory of 1064 2028 windows.exe 77
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:672
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"2⤵PID:756
-
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:60
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:392
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1160
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1292
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks1⤵PID:2924
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4092
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:4028
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3748
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\7d355265faef465587580732d8401886.exe"C:\Users\Admin\AppData\Local\Temp\7d355265faef465587580732d8401886.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\windows.exe"C:\windows.exe"3⤵
- Modifies firewall policy service
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 8484⤵
- Program crash
PID:3596
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc1⤵PID:3524
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:3108
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker1⤵PID:2996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService1⤵PID:2956
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2868
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2804
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer1⤵PID:2792
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc1⤵PID:2784
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2720
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2644
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent1⤵PID:2516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT1⤵PID:2484
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc1⤵PID:2280
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation1⤵PID:2248
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p1⤵PID:2164
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt1⤵PID:2132
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe1⤵PID:2076
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1960
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache1⤵PID:1952
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:516
-
C:\Windows\system32\MusNotification.exeC:\Windows\system32\MusNotification.exe1⤵PID:3356
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵PID:2776
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo1⤵PID:3232
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2972
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:1680
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:4348
-
C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe"C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service1⤵PID:3212
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc1⤵PID:3624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:3884
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc1⤵PID:3492
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc1⤵PID:3856
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager1⤵PID:4920
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵PID:4600
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4236
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository1⤵PID:1924
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalService -p -s netprofm1⤵PID:1816
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p1⤵PID:1800
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder1⤵PID:1744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s SENS1⤵PID:1708
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc1⤵PID:1644
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp1⤵PID:1432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1404
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1336
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1204
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1152
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1128
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1104
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p1⤵PID:1064
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:652
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:956
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS -p1⤵PID:908
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p1⤵PID:788
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding2⤵PID:3904
-
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:760
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2028 -ip 20281⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
201KB
MD502d4c9a92b4d17cec860b4d6089d7453
SHA11f43da3736724fbc13c54120369484f7dbe59290
SHA256afc33ff93923983c4d4d70281cc840b7de3d99e070a280f5376082b529eb211a
SHA512de931cca11ed7181f395258eb3bef65aae301a97357311eceea331ea4d23970519bd812b6eca85718a0779119eac5b429193fec2a47951bcb02210b08339c34e