Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12/09/2024, 13:07
Behavioral task
behavioral1
Sample
fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll
Resource
win7-20240903-en
General
-
Target
fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll
-
Size
50KB
-
MD5
8a4ddc983d187eed6d044aba09d2e6e9
-
SHA1
8172aa1c1922542adebdd2c21f544e6d363d5aa5
-
SHA256
fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4
-
SHA512
9c064f74a144ced1328f40204bd1032c9df7178c8aa07c877676b5f7a958b07f63a2a7342a2121a438e8a758edc02003c316e2d54500a477e69b19318caac72f
-
SSDEEP
1536:WD1N4TeeWMWfPbp2WTrW9L3JPPgJ+o5lJYH:W5ReWjTrW9rNPgYorJYH
Malware Config
Extracted
gh0strat
hackerinvasion.f3322.net
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2348-0-0x0000000010000000-0x0000000010011000-memory.dmp family_gh0strat -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2348 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 276 wrote to memory of 2348 276 rundll32.exe 31 PID 276 wrote to memory of 2348 276 rundll32.exe 31 PID 276 wrote to memory of 2348 276 rundll32.exe 31 PID 276 wrote to memory of 2348 276 rundll32.exe 31 PID 276 wrote to memory of 2348 276 rundll32.exe 31 PID 276 wrote to memory of 2348 276 rundll32.exe 31 PID 276 wrote to memory of 2348 276 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fc0ee1019d1d70fe50276370eb04239799952a96c7eabc72353ab98462bdaea4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2348
-