Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/06/2024, 03:46

General

  • Target

    25ac52feb32cb6a749e08972d5b0a686f8a1e674496c9147cb23bb6c3d095114.exe

  • Size

    1.6MB

  • MD5

    1fcea600b31caa6afe38f274dbc26fdd

  • SHA1

    5f2306ae3943c7a73faef47660441d6ca071e13b

  • SHA256

    25ac52feb32cb6a749e08972d5b0a686f8a1e674496c9147cb23bb6c3d095114

  • SHA512

    e29506855d461eeb3db0687862386df8eb9d2a60bd3414f1cba955a802a139254cbac4b6f275996e8e6efb4e10952192ac162d80c6da390a6c5e33eb9b007b4b

  • SSDEEP

    24576:IYFbkIsaPiXSVnC7Yp9zjNmZG8RRl9QyzHSy1x:IYREXSVMKi3ck

Malware Config

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25ac52feb32cb6a749e08972d5b0a686f8a1e674496c9147cb23bb6c3d095114.exe
    "C:\Users\Admin\AppData\Local\Temp\25ac52feb32cb6a749e08972d5b0a686f8a1e674496c9147cb23bb6c3d095114.exe"
    1⤵
    • Drops file in Program Files directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Users\Admin\AppData\Local\Temp\look2.exe
      C:\Users\Admin\AppData\Local\Temp\\look2.exe
      2⤵
      • Server Software Component: Terminal Services DLL
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      PID:724
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k "svchcst"
    1⤵
      PID:4956
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\SysWOW64\svchost.exe -k "svchcst"
      1⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:4128
      • C:\Windows\SysWOW64\svchcst.exe
        C:\Windows\system32\svchcst.exe "c:\windows\system32\240599703.bat",MainThread
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        PID:2836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\HD_X.dat

      Filesize

      1.6MB

      MD5

      1fcea600b31caa6afe38f274dbc26fdd

      SHA1

      5f2306ae3943c7a73faef47660441d6ca071e13b

      SHA256

      25ac52feb32cb6a749e08972d5b0a686f8a1e674496c9147cb23bb6c3d095114

      SHA512

      e29506855d461eeb3db0687862386df8eb9d2a60bd3414f1cba955a802a139254cbac4b6f275996e8e6efb4e10952192ac162d80c6da390a6c5e33eb9b007b4b

    • C:\Users\Admin\AppData\Local\Temp\look2.exe

      Filesize

      337KB

      MD5

      fb66e1e31fa1e6dfb21a50ccd11e0409

      SHA1

      6c45a0a115ec896eb14a531a44809b2a22cf8934

      SHA256

      5ea8c5455f0ebe884ed98834e78ead8b6c68814bbb1723370299fa44b88c0faa

      SHA512

      58ee149f70438296a67d5ae5cbd6cb9f5b2510a0381466b8f09eec3835be1ce7cad6903ca8fbc9273105132e85952208e78c59f776416c5449b86cc62111154b

    • C:\Windows\SysWOW64\240599703.bat

      Filesize

      51KB

      MD5

      3a84d363f3f98d25de2e51dc7ce8cf84

      SHA1

      896cfc0b7c91d4a83ce713b516075f2199098f34

      SHA256

      f5a93cca2b5bf40f2e9ac73703d1e05a680a7823359d4e7fc986da9972a251d2

      SHA512

      f611a4d0338ae648ee99b1e340f431cc59571bc94bf7271e42c75159c7257329a7bf61cf21c0515044d697d1e4652d861e64e1c683b2e042716d11cb5bd181c4

    • C:\Windows\SysWOW64\svchcst.exe

      Filesize

      60KB

      MD5

      889b99c52a60dd49227c5e485a016679

      SHA1

      8fa889e456aa646a4d0a4349977430ce5fa5e2d7

      SHA256

      6cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910

      SHA512

      08933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641