Analysis
-
max time kernel
164s -
max time network
72s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/09/2022, 12:39
Behavioral task
behavioral1
Sample
a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe
Resource
win7-20220812-en
General
-
Target
a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe
-
Size
71KB
-
MD5
ba5e6346f5210d0e86f1c46fb782e823
-
SHA1
b67a98091f364b3d33ad9035bf0b4e7e33a5a94f
-
SHA256
a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3
-
SHA512
f7f0627584460136f68354ac9bd7d044f06d0c87257fd0375fc2ba1387038fbc42b6275d0e3f58f9014a90c9fba638115fcc53e07b830fff546c06635deba131
-
SSDEEP
1536:jWZpTtLcWyeYd4//yEZc1GJf7/QP4uiryI5e:+pZTvnyEZiGJ7/QguiryI5e
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/files/0x000c00000001230c-55.dat family_gh0strat behavioral1/files/0x000c00000001230c-56.dat family_gh0strat behavioral1/files/0x00140000000054ab-58.dat family_gh0strat -
Deletes itself 1 IoCs
pid Process 1620 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1620 svchost.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Bqvo\Mcyqyluef.bmp a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe File created C:\Program Files (x86)\Bqvo\Mcyqyluef.bmp a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe 1620 svchost.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeRestorePrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeBackupPrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeRestorePrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeBackupPrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeRestorePrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeBackupPrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe Token: SeRestorePrivilege 1948 a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe"C:\Users\Admin\AppData\Local\Temp\a11c7d48cdf57ef77827568e81e20a1a9fb4a084baf7a2107856a5faee4b4ea3.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k imgsvc1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1620
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD57764357846ffe0063122e49143bc32b9
SHA1f455d2c45854082a6e1bcb56f475660c93029d26
SHA256697ff4433e9db0f43ee477cac026a231677fa4762c7c1cfdb2fdc49821e36394
SHA512945350dc7ad14609a86850a4bd0e280dba506fa32ea3c0b50d2227974146bba6efec7359b1718404e53140fb10f8585ecd8876c4cf958695e7d34c9adaa02b61
-
Filesize
116B
MD5ee1ae89cafd795326978fb87618614eb
SHA159d454fa0dc181bbd086c03b39d4843fc3a4049a
SHA2567d51b305407c36294441e2151b04ecce74264055f10d4eebca230aa09c8efe40
SHA512dfbf0a5d7019e3395a59db4a76645f0ee93f32aee805fe56f8cbb28b1e214b794ef569e443396bee0661846dac4e28113ee05112b4d302d0ea4f7a776caee24a
-
Filesize
11.5MB
MD53853f52f1d9478e9256974a3f79ab2a3
SHA1115cdbc81e157560df3ce15b8783f6f72ace40db
SHA256a88ef237f683c08db5128b92c2334de4ad138dfc119b2c6e62a9a03e744ec675
SHA512484137a7b8fd65d340fc2fe78b9fb7019a5da78b77137d43752ac57380be5bed9ad89dda4826efa223b57a0fffae767585e9a9a59e7a17af98988db6b64a7412
-
Filesize
11.5MB
MD53853f52f1d9478e9256974a3f79ab2a3
SHA1115cdbc81e157560df3ce15b8783f6f72ace40db
SHA256a88ef237f683c08db5128b92c2334de4ad138dfc119b2c6e62a9a03e744ec675
SHA512484137a7b8fd65d340fc2fe78b9fb7019a5da78b77137d43752ac57380be5bed9ad89dda4826efa223b57a0fffae767585e9a9a59e7a17af98988db6b64a7412