Analysis
-
max time kernel
35s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
02/10/2022, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe
Resource
win10v2004-20220901-en
General
-
Target
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe
-
Size
184KB
-
MD5
6b42c4773f94105895dbffff76a2ff80
-
SHA1
1346bbff87eda91e78cb0007a7fd97944fcd73ad
-
SHA256
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22
-
SHA512
63a5826caaedfe7df758544c9e90f977ac5c24e1f1f2d55cf7f6adce9deb065d9f2cd9a380f7e1d183192200c074a90233915ca147b0275a272ba7a33c1ac992
-
SSDEEP
3072:QKdAWkTthrHwvxiIe91s+n3p/5e8jR0cTs/w+VLXKr6vkvs9R8igyQfgEOBeOB0w:jwQvXoim363/OG58dyQIpXD
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral1/memory/2036-57-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2036-60-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral1/memory/2036-118-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXBA9CE30A = "C:\\Windows\\XXXXXXBA9CE30A\\svchsot.exe" 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\XXXXXXBA9CE30A\JH.BAT 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 784 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1528 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 26 PID 2036 wrote to memory of 1528 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 26 PID 2036 wrote to memory of 1528 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 26 PID 2036 wrote to memory of 1528 2036 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 26 PID 1528 wrote to memory of 1992 1528 cmd.exe 28 PID 1528 wrote to memory of 1992 1528 cmd.exe 28 PID 1528 wrote to memory of 1992 1528 cmd.exe 28 PID 1528 wrote to memory of 1992 1528 cmd.exe 28 PID 1528 wrote to memory of 784 1528 cmd.exe 29 PID 1528 wrote to memory of 784 1528 cmd.exe 29 PID 1528 wrote to memory of 784 1528 cmd.exe 29 PID 1528 wrote to memory of 784 1528 cmd.exe 29 PID 1528 wrote to memory of 960 1528 cmd.exe 30 PID 1528 wrote to memory of 960 1528 cmd.exe 30 PID 1528 wrote to memory of 960 1528 cmd.exe 30 PID 1528 wrote to memory of 960 1528 cmd.exe 30 PID 960 wrote to memory of 1976 960 net.exe 31 PID 960 wrote to memory of 1976 960 net.exe 31 PID 960 wrote to memory of 1976 960 net.exe 31 PID 960 wrote to memory of 1976 960 net.exe 31 PID 1528 wrote to memory of 1604 1528 cmd.exe 32 PID 1528 wrote to memory of 1604 1528 cmd.exe 32 PID 1528 wrote to memory of 1604 1528 cmd.exe 32 PID 1528 wrote to memory of 1604 1528 cmd.exe 32 PID 1528 wrote to memory of 1980 1528 cmd.exe 33 PID 1528 wrote to memory of 1980 1528 cmd.exe 33 PID 1528 wrote to memory of 1980 1528 cmd.exe 33 PID 1528 wrote to memory of 1980 1528 cmd.exe 33 PID 1528 wrote to memory of 1640 1528 cmd.exe 34 PID 1528 wrote to memory of 1640 1528 cmd.exe 34 PID 1528 wrote to memory of 1640 1528 cmd.exe 34 PID 1528 wrote to memory of 1640 1528 cmd.exe 34 PID 1528 wrote to memory of 1496 1528 cmd.exe 35 PID 1528 wrote to memory of 1496 1528 cmd.exe 35 PID 1528 wrote to memory of 1496 1528 cmd.exe 35 PID 1528 wrote to memory of 1496 1528 cmd.exe 35 PID 1528 wrote to memory of 1648 1528 cmd.exe 36 PID 1528 wrote to memory of 1648 1528 cmd.exe 36 PID 1528 wrote to memory of 1648 1528 cmd.exe 36 PID 1528 wrote to memory of 1648 1528 cmd.exe 36 PID 1528 wrote to memory of 1832 1528 cmd.exe 37 PID 1528 wrote to memory of 1832 1528 cmd.exe 37 PID 1528 wrote to memory of 1832 1528 cmd.exe 37 PID 1528 wrote to memory of 1832 1528 cmd.exe 37 PID 1528 wrote to memory of 1016 1528 cmd.exe 38 PID 1528 wrote to memory of 1016 1528 cmd.exe 38 PID 1528 wrote to memory of 1016 1528 cmd.exe 38 PID 1528 wrote to memory of 1016 1528 cmd.exe 38 PID 1528 wrote to memory of 1392 1528 cmd.exe 39 PID 1528 wrote to memory of 1392 1528 cmd.exe 39 PID 1528 wrote to memory of 1392 1528 cmd.exe 39 PID 1528 wrote to memory of 1392 1528 cmd.exe 39 PID 1528 wrote to memory of 1368 1528 cmd.exe 40 PID 1528 wrote to memory of 1368 1528 cmd.exe 40 PID 1528 wrote to memory of 1368 1528 cmd.exe 40 PID 1528 wrote to memory of 1368 1528 cmd.exe 40 PID 1528 wrote to memory of 268 1528 cmd.exe 41 PID 1528 wrote to memory of 268 1528 cmd.exe 41 PID 1528 wrote to memory of 268 1528 cmd.exe 41 PID 1528 wrote to memory of 268 1528 cmd.exe 41 PID 1528 wrote to memory of 1564 1528 cmd.exe 42 PID 1528 wrote to memory of 1564 1528 cmd.exe 42 PID 1528 wrote to memory of 1564 1528 cmd.exe 42 PID 1528 wrote to memory of 1564 1528 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe"C:\Users\Admin\AppData\Local\Temp\7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe"1⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\XXXXXXBA9CE30A\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:1992
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:784
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:1976
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1604
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1980
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1640
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1496
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1648
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1832
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1016
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1392
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1368
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:268
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1564
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1656
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1508
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:772
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1708
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1048
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1620
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1852
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:616
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:940
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1484
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:948
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:968
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1816
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1808
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8708048b03fe68bb7f28c442633d2f6
SHA13f523cfac1766a03975539c3b6be1763231c299f
SHA256096aa79c769256466f285a41fecd0b6e173cb3ea4fede684f5afd4339d43e23b
SHA512ab07c20018e364fb82a1a1770bc5f8b6a93811ca4bffffcc3eb0f1ef7e4d50545bc46fff033b2bf69094a693c0351a34bca756a819246ad3fd423b43dd76e254