Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
132s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22/10/2024, 13:58
Behavioral task
behavioral1
Sample
c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe
Resource
win7-20240903-en
General
-
Target
c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe
-
Size
60KB
-
MD5
90d83bbad8110780e90b8f0beab172f9
-
SHA1
0ced0e716b07945787bf78ae6296a5f24bfdbe59
-
SHA256
c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105
-
SHA512
92d4a6697644925176852c2b43bf297b16afadc2a993c135b5aa9df3c74a280bfb7cde883c6bf5c8b06202ff55168997dcf89ef2e791a3aeaca3cb09b6ac7707
-
SSDEEP
768:3e1iZNbQAKrWGOkGQeN70ZqL378KBBmbUt4i:36iZNer5GQvkUath
Malware Config
Extracted
redosdru
http://xiazai.caobibibi.com:7744/8.77.dll
Signatures
-
Gh0st RAT payload 11 IoCs
resource yara_rule behavioral2/memory/2680-8-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/2680-9-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/2680-12-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/2680-10-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/2956-27-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/2956-26-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/1688-32-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/1688-33-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/1688-34-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/1688-35-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat behavioral2/memory/1688-48-0x0000000010000000-0x000000001034B000-memory.dmp family_gh0strat -
Redosdru
Redosdru is a loader/downloader written in C++.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe -
Deletes itself 1 IoCs
pid Process 4796 conhostdhfw.exe -
Executes dropped EXE 4 IoCs
pid Process 2956 conhostdhfw.exe 1688 conhostdhfw.exe 4796 conhostdhfw.exe 2276 conhostdhfw.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\349D186F1CB5682FA0194D4F3754EF36_BC1D0671A6396D650996E0E6013A6D37 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CF14D1855652602540DFCFECD21854DB_8C1AD9434E0E1576771CA7E7EAD43D9E conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\IE conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\349D186F1CB5682FA0194D4F3754EF36_BC1D0671A6396D650996E0E6013A6D37 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\INetCookies conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\0DA515F703BB9B49479E8697ADB0B955_786387CC77858B88BA3234B304062475 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CF14D1855652602540DFCFECD21854DB_8C1AD9434E0E1576771CA7E7EAD43D9E conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B039FEA45CB4CC4BBACFC013C7C55604_50D7940D5D3FEDD8634D83074C7A46A3 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\History\History.IE5 conhostdhfw.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft conhostdhfw.exe -
resource yara_rule behavioral2/memory/2680-5-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/2680-8-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/2680-9-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/2680-12-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/2680-10-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/2956-27-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/2956-26-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/1688-29-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/1688-32-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/1688-33-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/1688-34-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/1688-35-0x0000000010000000-0x000000001034B000-memory.dmp upx behavioral2/memory/1688-48-0x0000000010000000-0x000000001034B000-memory.dmp upx -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\Windows NT\conhostdhfw.exe c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe File opened for modification C:\Program Files (x86)\Windows NT\conhostdhfw.exe c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe File created C:\Program Files\AppPatch\8.77.dll c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe File opened for modification C:\Program Files\AppPatch\8.77.dll c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1452 1688 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhostdhfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhostdhfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhostdhfw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conhostdhfw.exe -
Modifies data under HKEY_USERS 16 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P conhostdhfw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" conhostdhfw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\P3P\History conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings conhostdhfw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows conhostdhfw.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix conhostdhfw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" conhostdhfw.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software conhostdhfw.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion conhostdhfw.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1688 conhostdhfw.exe Token: SeDebugPrivilege 1688 conhostdhfw.exe Token: SeDebugPrivilege 4796 conhostdhfw.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2680 wrote to memory of 2956 2680 c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe 87 PID 2680 wrote to memory of 2956 2680 c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe 87 PID 2680 wrote to memory of 2956 2680 c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe 87 PID 1688 wrote to memory of 4796 1688 conhostdhfw.exe 91 PID 1688 wrote to memory of 4796 1688 conhostdhfw.exe 91 PID 1688 wrote to memory of 4796 1688 conhostdhfw.exe 91 PID 1688 wrote to memory of 2276 1688 conhostdhfw.exe 92 PID 1688 wrote to memory of 2276 1688 conhostdhfw.exe 92 PID 1688 wrote to memory of 2276 1688 conhostdhfw.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe"C:\Users\Admin\AppData\Local\Temp\c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Program Files (x86)\Windows NT\conhostdhfw.exe"C:\Program Files (x86)\Windows NT\conhostdhfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956
-
-
C:\Program Files (x86)\Windows NT\conhostdhfw.exe"C:\Program Files (x86)\Windows NT\conhostdhfw.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Program Files (x86)\Windows NT\conhostdhfw.exe"C:\Program Files (x86)\Windows NT\conhostdhfw.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Program Files (x86)\Windows NT\conhostdhfw.exe"C:\Program Files (x86)\Windows NT\conhostdhfw.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 5602⤵
- Program crash
PID:1452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1688 -ip 16881⤵PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD590d83bbad8110780e90b8f0beab172f9
SHA10ced0e716b07945787bf78ae6296a5f24bfdbe59
SHA256c28770a88ad997d80ca6f461893cd6f032f614a43c449f21e73df15e8a843105
SHA51292d4a6697644925176852c2b43bf297b16afadc2a993c135b5aa9df3c74a280bfb7cde883c6bf5c8b06202ff55168997dcf89ef2e791a3aeaca3cb09b6ac7707
-
Filesize
240KB
MD50a74e0bffbce3cc5466796739cfdeb44
SHA1c3b50df0a1de18b7053bff1b0293f5512f824055
SHA256cdabc33a27b23c2060637193a4cbad94e16d31e6a4df7d67bdc6b63c1d056b30
SHA5129fb4f39d95820f63da2d8767b76f317c512a8db1b86428f04baf4b163d0deaee5c4726c9f66807a3b1c223d575557fabc88e0cde73a4561b304f6edd76b8cc36