Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/03/2025, 01:03

General

  • Target

    767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll

  • Size

    137KB

  • MD5

    07a5b7c2b0ecb4c0fce3dc1854b19c06

  • SHA1

    a5424f674292d9bcf1d6198540e2289f889de042

  • SHA256

    767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf

  • SHA512

    8919c247ab8fcf05a785b0dcc3b579fb7a7285aa6a2b46c7f2426857632d8f1de593e8e2e50f054adcf78a193fd32367bb41d9e4ae8a0a61adbfd03b67d4faa2

  • SSDEEP

    3072:rR02WMK8RJGInTlhnaBanONVk40rpg4yeF/TyUGSK9FrafcUksPxx6iTUu2:G25GgFny61mraQ

Malware Config

Signatures

  • Gh0st RAT payload 3 IoCs
  • Gh0strat

    Gh0st RAT is a remote access tool (RAT) with its source code public and it has been used by multiple Chinese groups.

  • Gh0strat family
  • Blocklisted process makes network request 1 IoCs
  • Boot or Logon Autostart Execution: Port Monitors 1 TTPs 16 IoCs

    Adversaries may use port monitors to run an adversary supplied DLL during system boot for persistence or privilege escalation.

  • Sets service image path in registry 2 TTPs 2 IoCs
  • ACProtect 1.3x - 1.4x DLL software 16 IoCs

    Detects file using ACProtect software.

  • Drops file in System32 directory 10 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 12 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1572
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\767cc0a526a752424af4cb167d9c94faeaf3eebebbd04e11c1f7fd8ed5a903bf.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Boot or Logon Autostart Execution: Port Monitors
      • Sets service image path in registry
      • Drops file in System32 directory
      • Suspicious use of SetThreadContext
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3468
      • C:\Windows\SysWOW64\svchost.exe
        C:\Windows\system32\svchost.exe -k rundll32
        3⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Sets service image path in registry
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:1844
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 616
        3⤵
        • Program crash
        PID:1508
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3468 -ip 3468
    1⤵
      PID:2784
    • C:\Windows\system32\Spoolsv.exe
      Spoolsv.exe
      1⤵
        PID:2740
      • C:\Windows\system32\Spoolsv.exe
        Spoolsv.exe
        1⤵
        • Boot or Logon Autostart Execution: Port Monitors
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        PID:2784

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Windows\AppPatch\ComBack.Dll

        Filesize

        137KB

        MD5

        f7ac9f2d26bf9688254171c81881020d

        SHA1

        d6ef0fcdf531ddd3f5f81c68808acb3fc669fa23

        SHA256

        6ba36cc739f9617c8b3ef487a04954884fb12b8edf682e6d7f08d9e1294ae708

        SHA512

        36ef84428186a171d149e3664463bed85d7ab6eef2a54ed02deaa7ebe9128ecaa0084c25cd303ceec9e159200103a200f5bf667d97be0472cb795ac3a8ef2119

      • C:\Windows\SysWOW64\Miscson.dll

        Filesize

        137KB

        MD5

        1d044bf005206e2b0f591c7e54f9dc9e

        SHA1

        2f5f431ba1ae2b3c5c1bd562d489f53441344bf8

        SHA256

        e49fab6c42d5afefb199c9c3bb0556e0fdbd611e70100d6381306275dbbc9aae

        SHA512

        dc6f18d88e6dbee4342e48bd21ab66e4f2c3156959cb67358c3489c221399559dd3f8eef35fea1e30daa838b6f0c6ad0c6777251c704d63f06e01a4f81949ca7

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        128B

        MD5

        f1ffe71c0bdcbd07a61672713f6f9d73

        SHA1

        a6e6b7fcc53bebd25a933333803fb60af64b7c76

        SHA256

        749b186e82c4b411b56599614fb1d835e7fc63997efe86b16366c42176f475a5

        SHA512

        d865254dfb00a4cccd9ef43eab24d65a9bf36247eace43314b5a078159ec8300c801ef47f70095fd1618fb3aa3a8a352e5d89fb30422e1cd2e64505d2faf2341

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        247B

        MD5

        9227b22e3c51e71cbabc8b4a33738a30

        SHA1

        1a45435397c2b2042f6077cb1a7e338e3d51debf

        SHA256

        c9397a1c4230924d92b682f3e017c6def59952c37cebb79a62b02767bffca0e0

        SHA512

        f14dffe4bfcb3228e4894bf74193ef3f21648ca5c3f3a04a3fc484cb7f59086e0af84eb2245ca3b3da994cbe03d1b5cf7276045d7cffc99dc0cb8aff2d8e66e5

      • C:\Windows\SysWOW64\com\comb.dll

        Filesize

        290B

        MD5

        607cbbf7c60c3ce3b0e425c5a8216111

        SHA1

        f9a7de5a2e5d43685dc4b10f8e590eed1db9aafe

        SHA256

        a56a96204a3c917e72d7a43618a5180c08c16908f999f795973bc3611a84626c

        SHA512

        5536b26470360180e375e9cf00f6e1bc568325650077cc37f17be95543cd2ddcfa521803ba5a2bec019aeb04215637f41e4e35c0970636784871ef7cda36dbd9

      • C:\Windows\SysWOW64\scsimon.dll

        Filesize

        137KB

        MD5

        d3f04077312e8e85323fd8cd44636fde

        SHA1

        9d7239040ee0e5dc8c509c70bc54e28cf7b94432

        SHA256

        e632c61ab2a7e3c8863714589803f0393a9aca9d6c8d27c85cd8e417156b6599

        SHA512

        1e59adebb2b56457f9ff25948f5acbfdac21eea1b23012b67dd9aa83268adab4cf036fb6e237a513b9a7e3951376a2248640cc391a62f207b145b3501bdc6cab

      • memory/1844-17-0x0000000001510000-0x0000000001537000-memory.dmp

        Filesize

        156KB

      • memory/1844-44-0x0000000001510000-0x0000000001537000-memory.dmp

        Filesize

        156KB

      • memory/1844-14-0x0000000001510000-0x0000000001537000-memory.dmp

        Filesize

        156KB

      • memory/1844-27-0x0000000003220000-0x000000000323D000-memory.dmp

        Filesize

        116KB

      • memory/1844-28-0x0000000003220000-0x000000000323D000-memory.dmp

        Filesize

        116KB

      • memory/1844-16-0x0000000000D60000-0x0000000000D83000-memory.dmp

        Filesize

        140KB

      • memory/1844-21-0x0000000001510000-0x0000000001537000-memory.dmp

        Filesize

        156KB

      • memory/1844-30-0x0000000003220000-0x000000000323D000-memory.dmp

        Filesize

        116KB

      • memory/1844-25-0x0000000003220000-0x000000000323D000-memory.dmp

        Filesize

        116KB

      • memory/1844-24-0x0000000003220000-0x000000000323D000-memory.dmp

        Filesize

        116KB

      • memory/1844-29-0x0000000003220000-0x000000000323D000-memory.dmp

        Filesize

        116KB

      • memory/3468-13-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB

      • memory/3468-9-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB

      • memory/3468-11-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB

      • memory/3468-12-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB

      • memory/3468-40-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB

      • memory/3468-41-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3468-43-0x0000000043E50000-0x0000000043E77000-memory.dmp

        Filesize

        156KB

      • memory/3468-4-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3468-15-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB

      • memory/3468-8-0x0000000010000000-0x000000001001C000-memory.dmp

        Filesize

        112KB

      • memory/3468-5-0x0000000002880000-0x000000000289D000-memory.dmp

        Filesize

        116KB