Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
140s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/06/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe
Resource
win10v2004-20240508-en
General
-
Target
ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe
-
Size
400KB
-
MD5
36641ec28d549d2b71f5b016fae295db
-
SHA1
23262ebeb025cafd64c0c5a28c35f5f4d47a7816
-
SHA256
ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120
-
SHA512
21f34e439d30fb7970a399f56f94d234f7e64b4c2ce56bf7c09968bbcdcd713586df2c11d9fdab2f7088d353461a7ec6e22593ed2cc9ee5f72e4f388b2e25eae
-
SSDEEP
3072:vRK/yLrQbWaR5Qax8c/Yt5Kgm45EWWdfnaZf4Xvl4luK:vIyLEbWaR5CchE6nmCzK
Malware Config
Extracted
gh0strat
fdsfhkjf.e3.luyouxia.net
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral1/memory/1728-0-0x0000000010000000-0x0000000010015000-memory.dmp family_gh0strat behavioral1/memory/1728-15-0x0000000000400000-0x0000000000466000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 1376 Ymgyccc.exe 2872 Ymgyccc.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\R: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\X: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\G: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\H: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\M: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\O: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\K: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\L: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\P: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\Q: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\T: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\Z: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\E: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\I: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\J: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\N: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\W: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\Y: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\B: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\S: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\U: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened (read-only) \??\V: ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Ymgyccc.exe ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe File opened for modification C:\Program Files (x86)\Ymgyccc.exe ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1728 ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe 1728 ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe 1376 Ymgyccc.exe 1376 Ymgyccc.exe 2872 Ymgyccc.exe 2872 Ymgyccc.exe 1728 ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1728 ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2872 1376 Ymgyccc.exe 29 PID 1376 wrote to memory of 2872 1376 Ymgyccc.exe 29 PID 1376 wrote to memory of 2872 1376 Ymgyccc.exe 29 PID 1376 wrote to memory of 2872 1376 Ymgyccc.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe"C:\Users\Admin\AppData\Local\Temp\ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120.exe"1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
PID:1728
-
C:\Program Files (x86)\Ymgyccc.exe"C:\Program Files (x86)\Ymgyccc.exe"1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Ymgyccc.exe"C:\Program Files (x86)\Ymgyccc.exe" Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
400KB
MD536641ec28d549d2b71f5b016fae295db
SHA123262ebeb025cafd64c0c5a28c35f5f4d47a7816
SHA256ba37370a4e2c69d6125e3cb76c4b120e06c26fa9a476b13013f1a033749ae120
SHA51221f34e439d30fb7970a399f56f94d234f7e64b4c2ce56bf7c09968bbcdcd713586df2c11d9fdab2f7088d353461a7ec6e22593ed2cc9ee5f72e4f388b2e25eae