Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    145s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    27/06/2024, 23:10

General

  • Target

    Ghost安装器.exe

  • Size

    4.5MB

  • MD5

    ac33168a21c93cae0af18edcc477baa0

  • SHA1

    5ba450393e08eaa748a9b03e7bd191106b48a30e

  • SHA256

    020c3fd01f2802b258becf7411c5d76b405d685d5ec26c1fa7e03d22a052d23b

  • SHA512

    a5c632103b2b455ae949406a9b4edca40eb72aa9d06bc59f8d290d837b76768422467647cad78619492e856fc871746bf8c07bcdc9e0ccfc1701e273d1aad026

  • SSDEEP

    98304:XSxZuGZQ2rFDZGagdFKrV+9d7QAbzEK77BJ:ie2rFDQbp9lxzj7VJ

Score
7/10
upx

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Ghost安装器.exe
    "C:\Users\Admin\AppData\Local\Temp\Ghost安装器.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in System32 directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c DSPTW.exe /a /pdr>dspt.txt
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Windows\SysWOW64\DSPTW.exe
        DSPTW.exe /a /pdr
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        PID:3060
    • C:\Windows\SysWOW64\SHOWDRIVE.EXE
      SHOWDRIVE.EXE
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      PID:2880
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c DSPTW.exe /a /pdr>dspt.txt
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\DSPTW.exe
        DSPTW.exe /a /pdr
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DSPTW.exe

    Filesize

    23KB

    MD5

    c3429879521305de064a0952dab5eb6a

    SHA1

    167e21603daacb16801e0e3cc1693d2da4d65cc4

    SHA256

    9f8439a9217a1f1e2aa46e611a8e38b591500f986c484ec179cfef712cbff707

    SHA512

    be10440e7a805c5f28e861a0e71633d7bc3f68947218ba707f3a7d43dcb2896a550f686944fe4cfc2328e9d0bfe63c0c81da2bfd64b45c576e12d7a13480e266

  • C:\Windows\SysWOW64\dspt.txt

    Filesize

    158B

    MD5

    2170a3016bb3ad550742ca6acccc7c5b

    SHA1

    d2d180eee47f716cf6765cf688d75044dbc286ad

    SHA256

    8188f92adc8aaa7ff3eb988eaa53d3ac00c42a5c4f471d7dc2f250dc2dd6325f

    SHA512

    bb14fd76a693948b1e13fb6ff657c006acca6a56a904bc0ea851d3e5bb4806615257308ad2c8ca43c5041da4b6d053fb6d78c8f2839e7461f8b078169fc90d44

  • C:\Windows\SysWOW64\dspt.txt

    Filesize

    202B

    MD5

    e9fe4eb013f8ef7b6225b06acbc11eed

    SHA1

    6652dc969b3b464fa2222ded0657ae01421a810d

    SHA256

    fafbf7adc117c5a06e9404c7d6c5311261ec3fad17ae2c011b8d622cce899f90

    SHA512

    9330f4a16f1668b6babaa76a2f84c4289c32267820f1a07b483407e88100f0eb77e8d8e7e3233e453aafc752ee858ef474564c3f315be89d3b8de0449362c958

  • \Windows\SysWOW64\SHOWDRIVE.EXE

    Filesize

    28KB

    MD5

    9dcc76e36021f25312903377500566e2

    SHA1

    c74d638a38e3b842b8a06958e96b11081de8d1e4

    SHA256

    c1863cecf48d4e0dc26326081a6bc6d6975e86d9b395fa6e49eaec632ad1c5b7

    SHA512

    ab751b0427ce78225f2bfa686a643aebccad7b60094c27c3a75e80bfc975dccc6aa9ae96761ca218069dc22d4161fb7837a14287dcd9287af3f35e84c2b08c5d

  • memory/2096-51-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2096-0-0x0000000000400000-0x00000000004BD000-memory.dmp

    Filesize

    756KB

  • memory/2260-37-0x0000000000170000-0x0000000000182000-memory.dmp

    Filesize

    72KB

  • memory/2860-39-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/2860-41-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3020-11-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3020-12-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3060-15-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB

  • memory/3060-13-0x0000000000400000-0x0000000000412000-memory.dmp

    Filesize

    72KB