Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
28/05/2024, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe
Resource
win10v2004-20240426-en
General
-
Target
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe
-
Size
1.1MB
-
MD5
dfcc258ed7c2c1d0ddbda108b78a1f16
-
SHA1
4bb1e2d0f5452c8d8d682158bea2cacfd8d80427
-
SHA256
093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975
-
SHA512
e330e676e803134451e956c9df4c23bee97a26334b5586370084d0909da1595102fdae408819efbc03aaf9f4ab351a208c81721ecd67daf7b0123dfe5068478b
-
SSDEEP
24576:NEdksIGN71VVbzYEL+5dNmZG8RRl9T7t/Bi:NEywVVvUji3TJBi
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/files/0x0037000000015d02-6.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\svchist\Parameters\ServiceDll = "C:\\Windows\\system32\\259399460.bat" GLk.exe -
Executes dropped EXE 2 IoCs
pid Process 2372 GLk.exe 2740 svchist.exe -
Loads dropped DLL 5 IoCs
pid Process 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 2372 GLk.exe 3044 svchost.exe 3044 svchost.exe 2740 svchist.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\259399460.bat GLk.exe File opened for modification C:\Windows\SysWOW64\ini.ini GLk.exe File created C:\Windows\SysWOW64\svchist.exe svchost.exe File opened for modification C:\Windows\SysWOW64\svchist.exe svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2372 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 28 PID 2164 wrote to memory of 2372 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 28 PID 2164 wrote to memory of 2372 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 28 PID 2164 wrote to memory of 2372 2164 093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe 28 PID 3044 wrote to memory of 2740 3044 svchost.exe 31 PID 3044 wrote to memory of 2740 3044 svchost.exe 31 PID 3044 wrote to memory of 2740 3044 svchost.exe 31 PID 3044 wrote to memory of 2740 3044 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe"C:\Users\Admin\AppData\Local\Temp\093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\GLk.exeC:\Users\Admin\AppData\Local\Temp\\GLk.exe2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2372
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵PID:2720
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "svchist"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\svchist.exeC:\Windows\system32\svchist.exe "c:\windows\system32\259399460.bat",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5dfcc258ed7c2c1d0ddbda108b78a1f16
SHA14bb1e2d0f5452c8d8d682158bea2cacfd8d80427
SHA256093b2510297a5099f8558215c1e860bdc4c9e61f5145ced2f30ecf8a91b35975
SHA512e330e676e803134451e956c9df4c23bee97a26334b5586370084d0909da1595102fdae408819efbc03aaf9f4ab351a208c81721ecd67daf7b0123dfe5068478b
-
Filesize
337KB
MD5b8e58a96761799f4ad0548dba39d650c
SHA1c00032d40cfbe4ccfd3ce3e4c8defb2a2ef9fc1f
SHA256334e8e7c65b087985766d652f70b710bdba6aea55a2fa17b97ba2961e8eee9df
SHA5121cd94994ed3f6594e37e6cd1d266ff96bb37c5e99d9ce6fd4637ed615ee8c6496b54a025fdccced6fca200f8f2da8011177c67c943676b30bfb0655393765fe3
-
Filesize
51KB
MD5ea08bd6a28c6eda098eda0d6212ec747
SHA1dfeb51a058e8ab28dc073c17481f7e85daaeee5f
SHA2561f22c0076c9b88510f2bad6b772b4d34b945fcecb68b3c01d405ac3202588f1e
SHA5121b44b507931112d97e6985c6b8845e48faa383c56fbc5022ad6bda9f1c587d11c73028cb0743c1fca45c1615fcbd9b56ddeefa6ddc250dde3c998cc89a31f107
-
Filesize
43KB
MD551138beea3e2c21ec44d0932c71762a8
SHA18939cf35447b22dd2c6e6f443446acc1bf986d58
SHA2565ad3c37e6f2b9db3ee8b5aeedc474645de90c66e3d95f8620c48102f1eba4124
SHA512794f30fe452117ff2a26dc9d7086aaf82b639c2632ac2e381a81f5239caaec7c96922ba5d2d90bfd8d74f0a6cd4f79fbda63e14c6b779e5cf6834c13e4e45e7d