Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 02:24
Static task
static1
Behavioral task
behavioral1
Sample
be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe
Resource
win10v2004-20240226-en
General
-
Target
be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe
-
Size
572KB
-
MD5
6a7dbf9cf7f21fd9e36a8f946a9ba32b
-
SHA1
08b2d505241bffdf824a9058806ad207cebd6b08
-
SHA256
be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510
-
SHA512
d167a4596843a7c08e3ea155b2930942dcc4cca1400274578ca6315917264de8e64b0f7412813236d7ff5ab1277f06d64951da3cbaae1b9e58c6618831d138b9
-
SSDEEP
12288:nruM9FNatyT3gNCpOdn/uVcZNJ7QD7HZ5rbx:q+atynpOd/HzJO7HX
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/872-3-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/872-4-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat behavioral2/memory/872-7-0x0000000010000000-0x0000000010121000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXX4FBB9E52 = "C:\\Windows\\XXXXXX4FBB9E52\\svchsot.exe" be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\XXXXXX4FBB9E52\svchsot.exe be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe File opened for modification C:\Windows\XXXXXX4FBB9E52\svchsot.exe be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 872 be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe 872 be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe 872 be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe 872 be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe 872 be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe 872 be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe"C:\Users\Admin\AppData\Local\Temp\be5e172e023a252269fcfff738377c0ee3de397bee7d44c21d002457ad2ce510.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:872