Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2025, 07:19
Behavioral task
behavioral1
Sample
莫贝1.27A/superec.ProcessMemory.sys
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
莫贝1.27A/superec.ProcessMemory.sys
Resource
win10v2004-20250217-en
Behavioral task
behavioral3
Sample
莫贝1.27A/莫贝1.27A.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
莫贝1.27A/莫贝1.27A.exe
Resource
win10v2004-20250217-en
General
-
Target
莫贝1.27A/莫贝1.27A.exe
-
Size
2.8MB
-
MD5
aa33abc410abcd33b5410cd6150cb3f0
-
SHA1
9d5378a5b7b84aa7fbde1268bb64ed1bbade4541
-
SHA256
db0c042f2cee58f542f92d09a9fbd0faf9bd15aaa1f597056c02210dc042c3e6
-
SHA512
423c29a604479856a408ae5c1c2e028e1c9b977ba72f4e50dc77bd4acf6f172134b740d10054d162b0daddd7fa9838ae7c817f9b822e961ad5ffbca3226e44b0
-
SSDEEP
24576:8q64aDApD1mzPSKkV2FsPPg9VXB0yzGNx212qEIyI+gfUgVrRhqoSp6YeVR5BGb7:8YpDQSwF/9hYcsRvJgfpVXvQRBlydw/
Malware Config
Signatures
-
Gh0st RAT payload 14 IoCs
resource yara_rule behavioral4/memory/3280-0-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/files/0x000c000000023bb1-3.dat family_gh0strat behavioral4/memory/3280-57-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-58-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-54-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-60-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-61-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-59-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-62-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-63-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-64-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-65-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-66-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat behavioral4/memory/3280-67-0x0000000000400000-0x00000000006C6000-memory.dmp family_gh0strat -
Gh0strat family
-
Executes dropped EXE 1 IoCs
pid Process 1424 crass.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2593460650-190333679-3676257533-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ball = "C:\\WINDOWS\\Ball.exe" crass.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\crass.exe 莫贝1.27A.exe -
resource yara_rule behavioral4/memory/3280-10-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-11-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-17-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-23-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-55-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-53-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-51-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-49-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-47-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-43-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-41-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-39-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-37-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-35-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-33-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-31-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-27-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-21-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-19-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-45-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-13-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-29-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-12-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-25-0x0000000002560000-0x000000000259E000-memory.dmp upx behavioral4/memory/3280-15-0x0000000002560000-0x000000000259E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\Ball.exe crass.exe File opened for modification C:\WINDOWS\Ball.exe crass.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 莫贝1.27A.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language crass.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 664 Process not Found 664 Process not Found 664 Process not Found 664 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1424 crass.exe Token: 33 3280 莫贝1.27A.exe Token: SeIncBasePriorityPrivilege 3280 莫贝1.27A.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe 3280 莫贝1.27A.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3280 wrote to memory of 1424 3280 莫贝1.27A.exe 96 PID 3280 wrote to memory of 1424 3280 莫贝1.27A.exe 96 PID 3280 wrote to memory of 1424 3280 莫贝1.27A.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\莫贝1.27A\莫贝1.27A.exe"C:\Users\Admin\AppData\Local\Temp\莫贝1.27A\莫贝1.27A.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\crass.exeC:\Windows\system32\\crass.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1424
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
584KB
MD519b547d281bfa52fe62827ebfc05cf87
SHA137d68f1cb4b888a0a11edb027c5e96b95f1b0816
SHA256e94ab3ef7693bb023305f6e3a9cf9554948f9d3236aff68e8e1e2d0d7051f084
SHA51272d440d178b5c74f7756a90887e2a20bd6dca4b0b274fc0375cdc03203dc51ad26c13564fbd554518a4cd244f048529cf3745be0bc473ac8e85cf59abc67e1a6