Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
27/06/2024, 23:10
Behavioral task
behavioral1
Sample
155绿色软件站.url
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
155绿色软件站.url
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
Ghost安装器.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
Ghost安装器.exe
Resource
win10v2004-20240611-en
General
-
Target
Ghost安装器.exe
-
Size
4.5MB
-
MD5
ac33168a21c93cae0af18edcc477baa0
-
SHA1
5ba450393e08eaa748a9b03e7bd191106b48a30e
-
SHA256
020c3fd01f2802b258becf7411c5d76b405d685d5ec26c1fa7e03d22a052d23b
-
SHA512
a5c632103b2b455ae949406a9b4edca40eb72aa9d06bc59f8d290d837b76768422467647cad78619492e856fc871746bf8c07bcdc9e0ccfc1701e273d1aad026
-
SSDEEP
98304:XSxZuGZQ2rFDZGagdFKrV+9d7QAbzEK77BJ:ie2rFDQbp9lxzj7VJ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3060 DSPTW.exe 2880 SHOWDRIVE.EXE 2860 DSPTW.exe -
Loads dropped DLL 5 IoCs
pid Process 3020 cmd.exe 3020 cmd.exe 2096 Ghost安装器.exe 2096 Ghost安装器.exe 2260 cmd.exe -
resource yara_rule behavioral3/memory/2096-0-0x0000000000400000-0x00000000004BD000-memory.dmp upx behavioral3/memory/2096-51-0x0000000000400000-0x00000000004BD000-memory.dmp upx -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: DSPTW.exe File opened (read-only) \??\W: DSPTW.exe File opened (read-only) \??\Y: DSPTW.exe File opened (read-only) \??\Z: DSPTW.exe File opened (read-only) \??\E: SHOWDRIVE.EXE File opened (read-only) \??\I: DSPTW.exe File opened (read-only) \??\T: DSPTW.exe File opened (read-only) \??\Z: DSPTW.exe File opened (read-only) \??\F: DSPTW.exe File opened (read-only) \??\O: DSPTW.exe File opened (read-only) \??\j: Ghost安装器.exe File opened (read-only) \??\J: DSPTW.exe File opened (read-only) \??\P: DSPTW.exe File opened (read-only) \??\D: DSPTW.exe File opened (read-only) \??\t: Ghost安装器.exe File opened (read-only) \??\v: Ghost安装器.exe File opened (read-only) \??\x: Ghost安装器.exe File opened (read-only) \??\Q: DSPTW.exe File opened (read-only) \??\D: SHOWDRIVE.EXE File opened (read-only) \??\w: Ghost安装器.exe File opened (read-only) \??\D: DSPTW.exe File opened (read-only) \??\L: DSPTW.exe File opened (read-only) \??\T: DSPTW.exe File opened (read-only) \??\P: DSPTW.exe File opened (read-only) \??\R: DSPTW.exe File opened (read-only) \??\V: DSPTW.exe File opened (read-only) \??\r: Ghost安装器.exe File opened (read-only) \??\K: DSPTW.exe File opened (read-only) \??\S: DSPTW.exe File opened (read-only) \??\X: DSPTW.exe File opened (read-only) \??\e: Ghost安装器.exe File opened (read-only) \??\p: Ghost安装器.exe File opened (read-only) \??\M: DSPTW.exe File opened (read-only) \??\Q: DSPTW.exe File opened (read-only) \??\I: DSPTW.exe File opened (read-only) \??\l: Ghost安装器.exe File opened (read-only) \??\E: DSPTW.exe File opened (read-only) \??\R: DSPTW.exe File opened (read-only) \??\G: DSPTW.exe File opened (read-only) \??\h: Ghost安装器.exe File opened (read-only) \??\o: Ghost安装器.exe File opened (read-only) \??\H: DSPTW.exe File opened (read-only) \??\U: DSPTW.exe File opened (read-only) \??\X: DSPTW.exe File opened (read-only) \??\n: Ghost安装器.exe File opened (read-only) \??\z: Ghost安装器.exe File opened (read-only) \??\O: DSPTW.exe File opened (read-only) \??\U: DSPTW.exe File opened (read-only) \??\L: DSPTW.exe File opened (read-only) \??\k: Ghost安装器.exe File opened (read-only) \??\s: Ghost安装器.exe File opened (read-only) \??\F: DSPTW.exe File opened (read-only) \??\H: DSPTW.exe File opened (read-only) \??\y: Ghost安装器.exe File opened (read-only) \??\G: DSPTW.exe File opened (read-only) \??\K: DSPTW.exe File opened (read-only) \??\S: DSPTW.exe File opened (read-only) \??\i: Ghost安装器.exe File opened (read-only) \??\F: SHOWDRIVE.EXE File opened (read-only) \??\Y: DSPTW.exe File opened (read-only) \??\u: Ghost安装器.exe File opened (read-only) \??\N: DSPTW.exe File opened (read-only) \??\V: DSPTW.exe File opened (read-only) \??\J: DSPTW.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral3/memory/2096-51-0x0000000000400000-0x00000000004BD000-memory.dmp autoit_exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Readme.txt Ghost安装器.exe File created C:\Windows\SysWOW64\DSPTW.exe Ghost安装器.exe File opened for modification C:\Windows\SysWOW64\DSPTW.exe Ghost安装器.exe File created C:\Windows\SysWOW64\dspt.txt cmd.exe File created C:\Windows\SysWOW64\SHOWDRIVE.EXE Ghost安装器.exe File opened for modification C:\Windows\SysWOW64\SHOWDRIVE.EXE Ghost安装器.exe File opened for modification C:\Windows\SysWOW64\dspt.txt cmd.exe File created C:\Windows\SysWOW64\Readme.txt Ghost安装器.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2096 Ghost安装器.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3020 2096 Ghost安装器.exe 28 PID 2096 wrote to memory of 3020 2096 Ghost安装器.exe 28 PID 2096 wrote to memory of 3020 2096 Ghost安装器.exe 28 PID 2096 wrote to memory of 3020 2096 Ghost安装器.exe 28 PID 3020 wrote to memory of 3060 3020 cmd.exe 30 PID 3020 wrote to memory of 3060 3020 cmd.exe 30 PID 3020 wrote to memory of 3060 3020 cmd.exe 30 PID 3020 wrote to memory of 3060 3020 cmd.exe 30 PID 2096 wrote to memory of 2880 2096 Ghost安装器.exe 31 PID 2096 wrote to memory of 2880 2096 Ghost安装器.exe 31 PID 2096 wrote to memory of 2880 2096 Ghost安装器.exe 31 PID 2096 wrote to memory of 2880 2096 Ghost安装器.exe 31 PID 2096 wrote to memory of 2260 2096 Ghost安装器.exe 32 PID 2096 wrote to memory of 2260 2096 Ghost安装器.exe 32 PID 2096 wrote to memory of 2260 2096 Ghost安装器.exe 32 PID 2096 wrote to memory of 2260 2096 Ghost安装器.exe 32 PID 2260 wrote to memory of 2860 2260 cmd.exe 34 PID 2260 wrote to memory of 2860 2260 cmd.exe 34 PID 2260 wrote to memory of 2860 2260 cmd.exe 34 PID 2260 wrote to memory of 2860 2260 cmd.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\Ghost安装器.exe"C:\Users\Admin\AppData\Local\Temp\Ghost安装器.exe"1⤵
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c DSPTW.exe /a /pdr>dspt.txt2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\DSPTW.exeDSPTW.exe /a /pdr3⤵
- Executes dropped EXE
- Enumerates connected drives
PID:3060
-
-
-
C:\Windows\SysWOW64\SHOWDRIVE.EXESHOWDRIVE.EXE2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:2880
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c DSPTW.exe /a /pdr>dspt.txt2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\DSPTW.exeDSPTW.exe /a /pdr3⤵
- Executes dropped EXE
- Enumerates connected drives
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD5c3429879521305de064a0952dab5eb6a
SHA1167e21603daacb16801e0e3cc1693d2da4d65cc4
SHA2569f8439a9217a1f1e2aa46e611a8e38b591500f986c484ec179cfef712cbff707
SHA512be10440e7a805c5f28e861a0e71633d7bc3f68947218ba707f3a7d43dcb2896a550f686944fe4cfc2328e9d0bfe63c0c81da2bfd64b45c576e12d7a13480e266
-
Filesize
158B
MD52170a3016bb3ad550742ca6acccc7c5b
SHA1d2d180eee47f716cf6765cf688d75044dbc286ad
SHA2568188f92adc8aaa7ff3eb988eaa53d3ac00c42a5c4f471d7dc2f250dc2dd6325f
SHA512bb14fd76a693948b1e13fb6ff657c006acca6a56a904bc0ea851d3e5bb4806615257308ad2c8ca43c5041da4b6d053fb6d78c8f2839e7461f8b078169fc90d44
-
Filesize
202B
MD5e9fe4eb013f8ef7b6225b06acbc11eed
SHA16652dc969b3b464fa2222ded0657ae01421a810d
SHA256fafbf7adc117c5a06e9404c7d6c5311261ec3fad17ae2c011b8d622cce899f90
SHA5129330f4a16f1668b6babaa76a2f84c4289c32267820f1a07b483407e88100f0eb77e8d8e7e3233e453aafc752ee858ef474564c3f315be89d3b8de0449362c958
-
Filesize
28KB
MD59dcc76e36021f25312903377500566e2
SHA1c74d638a38e3b842b8a06958e96b11081de8d1e4
SHA256c1863cecf48d4e0dc26326081a6bc6d6975e86d9b395fa6e49eaec632ad1c5b7
SHA512ab751b0427ce78225f2bfa686a643aebccad7b60094c27c3a75e80bfc975dccc6aa9ae96761ca218069dc22d4161fb7837a14287dcd9287af3f35e84c2b08c5d