Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    140s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/08/2024, 07:16 UTC

General

  • Target

    ed6d8109e2b3fbaf952535992b5e61420876f26b9dd5cba23acfa4ed2850a72d.dll

  • Size

    51KB

  • MD5

    254dd68ead74d42b7a5e7a8b1fac560b

  • SHA1

    c43a42c1821c4a6202b0de109ca9f98e6c25c4bf

  • SHA256

    ed6d8109e2b3fbaf952535992b5e61420876f26b9dd5cba23acfa4ed2850a72d

  • SHA512

    f32abd579a057e793e64ae76cb27dc44ff9756461ee278d7e73243845f06008217fd44a487550f0b2454983bc5ac9605158dcaf3ef0e9cbc955d46e8a11c9eed

  • SSDEEP

    1536:1WmqoiBMNbMWtYNif/n9S91BF3frnoL9JYH5:1dWubF3n9S91BF3fbohJYH5

Score
10/10

Malware Config

Extracted

Family

gh0strat

C2

kinh.xmcxmr.com

Signatures

  • Gh0st RAT payload 1 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6d8109e2b3fbaf952535992b5e61420876f26b9dd5cba23acfa4ed2850a72d.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ed6d8109e2b3fbaf952535992b5e61420876f26b9dd5cba23acfa4ed2850a72d.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2276-0-0x0000000010000000-0x0000000010011000-memory.dmp

    Filesize

    68KB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.