Analysis
-
max time kernel
118s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 09:18
Static task
static1
Behavioral task
behavioral1
Sample
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe
Resource
win10v2004-20220901-en
General
-
Target
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe
-
Size
184KB
-
MD5
6b42c4773f94105895dbffff76a2ff80
-
SHA1
1346bbff87eda91e78cb0007a7fd97944fcd73ad
-
SHA256
7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22
-
SHA512
63a5826caaedfe7df758544c9e90f977ac5c24e1f1f2d55cf7f6adce9deb065d9f2cd9a380f7e1d183192200c074a90233915ca147b0275a272ba7a33c1ac992
-
SSDEEP
3072:QKdAWkTthrHwvxiIe91s+n3p/5e8jR0cTs/w+VLXKr6vkvs9R8igyQfgEOBeOB0w:jwQvXoim363/OG58dyQIpXD
Malware Config
Signatures
-
Gh0st RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2216-134-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral2/memory/2216-135-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat behavioral2/memory/2216-137-0x0000000010000000-0x0000000010122000-memory.dmp family_gh0strat -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\XXXXXXBA9CE30A = "C:\\Windows\\XXXXXXBA9CE30A\\svchsot.exe" 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Default 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\XXXXXXBA9CE30A\JH.BAT 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1908 sc.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2108 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 83 PID 2216 wrote to memory of 2108 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 83 PID 2216 wrote to memory of 2108 2216 7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe 83 PID 2108 wrote to memory of 3588 2108 cmd.exe 85 PID 2108 wrote to memory of 3588 2108 cmd.exe 85 PID 2108 wrote to memory of 3588 2108 cmd.exe 85 PID 2108 wrote to memory of 1908 2108 cmd.exe 86 PID 2108 wrote to memory of 1908 2108 cmd.exe 86 PID 2108 wrote to memory of 1908 2108 cmd.exe 86 PID 2108 wrote to memory of 220 2108 cmd.exe 87 PID 2108 wrote to memory of 220 2108 cmd.exe 87 PID 2108 wrote to memory of 220 2108 cmd.exe 87 PID 220 wrote to memory of 2832 220 net.exe 88 PID 220 wrote to memory of 2832 220 net.exe 88 PID 220 wrote to memory of 2832 220 net.exe 88 PID 2108 wrote to memory of 4116 2108 cmd.exe 89 PID 2108 wrote to memory of 4116 2108 cmd.exe 89 PID 2108 wrote to memory of 4116 2108 cmd.exe 89 PID 2108 wrote to memory of 4008 2108 cmd.exe 90 PID 2108 wrote to memory of 4008 2108 cmd.exe 90 PID 2108 wrote to memory of 4008 2108 cmd.exe 90 PID 2108 wrote to memory of 796 2108 cmd.exe 91 PID 2108 wrote to memory of 796 2108 cmd.exe 91 PID 2108 wrote to memory of 796 2108 cmd.exe 91 PID 2108 wrote to memory of 1092 2108 cmd.exe 92 PID 2108 wrote to memory of 1092 2108 cmd.exe 92 PID 2108 wrote to memory of 1092 2108 cmd.exe 92 PID 2108 wrote to memory of 2256 2108 cmd.exe 93 PID 2108 wrote to memory of 2256 2108 cmd.exe 93 PID 2108 wrote to memory of 2256 2108 cmd.exe 93 PID 2108 wrote to memory of 3792 2108 cmd.exe 94 PID 2108 wrote to memory of 3792 2108 cmd.exe 94 PID 2108 wrote to memory of 3792 2108 cmd.exe 94 PID 2108 wrote to memory of 4664 2108 cmd.exe 95 PID 2108 wrote to memory of 4664 2108 cmd.exe 95 PID 2108 wrote to memory of 4664 2108 cmd.exe 95 PID 2108 wrote to memory of 2284 2108 cmd.exe 96 PID 2108 wrote to memory of 2284 2108 cmd.exe 96 PID 2108 wrote to memory of 2284 2108 cmd.exe 96 PID 2108 wrote to memory of 4688 2108 cmd.exe 97 PID 2108 wrote to memory of 4688 2108 cmd.exe 97 PID 2108 wrote to memory of 4688 2108 cmd.exe 97 PID 2108 wrote to memory of 1264 2108 cmd.exe 98 PID 2108 wrote to memory of 1264 2108 cmd.exe 98 PID 2108 wrote to memory of 1264 2108 cmd.exe 98 PID 2108 wrote to memory of 4372 2108 cmd.exe 99 PID 2108 wrote to memory of 4372 2108 cmd.exe 99 PID 2108 wrote to memory of 4372 2108 cmd.exe 99 PID 2108 wrote to memory of 4192 2108 cmd.exe 100 PID 2108 wrote to memory of 4192 2108 cmd.exe 100 PID 2108 wrote to memory of 4192 2108 cmd.exe 100 PID 2108 wrote to memory of 3060 2108 cmd.exe 101 PID 2108 wrote to memory of 3060 2108 cmd.exe 101 PID 2108 wrote to memory of 3060 2108 cmd.exe 101 PID 2108 wrote to memory of 3448 2108 cmd.exe 102 PID 2108 wrote to memory of 3448 2108 cmd.exe 102 PID 2108 wrote to memory of 3448 2108 cmd.exe 102 PID 2108 wrote to memory of 4468 2108 cmd.exe 103 PID 2108 wrote to memory of 4468 2108 cmd.exe 103 PID 2108 wrote to memory of 4468 2108 cmd.exe 103 PID 2108 wrote to memory of 1716 2108 cmd.exe 104 PID 2108 wrote to memory of 1716 2108 cmd.exe 104 PID 2108 wrote to memory of 1716 2108 cmd.exe 104 PID 2108 wrote to memory of 4604 2108 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe"C:\Users\Admin\AppData\Local\Temp\7d93a949898c9dab18f81dedeb1a43b04b2e4247f41c292b543bd24ff815ae22.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\XXXXXXBA9CE30A\JH.BAT2⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\schtasks.exeschtasks /delete /tn * /f3⤵PID:3588
-
-
C:\Windows\SysWOW64\sc.exesc config Schedule start= auto3⤵
- Launches sc.exe
PID:1908
-
-
C:\Windows\SysWOW64\net.exenet start "Task Scheduler"3⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start "Task Scheduler"4⤵PID:2832
-
-
-
C:\Windows\SysWOW64\at.exeAt 0:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4116
-
-
C:\Windows\SysWOW64\at.exeAt 1:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4008
-
-
C:\Windows\SysWOW64\at.exeAt 2:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:796
-
-
C:\Windows\SysWOW64\at.exeAt 3:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1092
-
-
C:\Windows\SysWOW64\at.exeAt 4:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:2256
-
-
C:\Windows\SysWOW64\at.exeAt 5:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:3792
-
-
C:\Windows\SysWOW64\at.exeAt 6:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4664
-
-
C:\Windows\SysWOW64\at.exeAt 7:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:2284
-
-
C:\Windows\SysWOW64\at.exeAt 8:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4688
-
-
C:\Windows\SysWOW64\at.exeAt 9:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1264
-
-
C:\Windows\SysWOW64\at.exeAt 10:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4372
-
-
C:\Windows\SysWOW64\at.exeAt 11:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4192
-
-
C:\Windows\SysWOW64\at.exeAt 12:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:3060
-
-
C:\Windows\SysWOW64\at.exeAt 13:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:3448
-
-
C:\Windows\SysWOW64\at.exeAt 14:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4468
-
-
C:\Windows\SysWOW64\at.exeAt 15:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1716
-
-
C:\Windows\SysWOW64\at.exeAt 16:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4604
-
-
C:\Windows\SysWOW64\at.exeAt 17:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4508
-
-
C:\Windows\SysWOW64\at.exeAt 18:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4720
-
-
C:\Windows\SysWOW64\at.exeAt 19:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:2520
-
-
C:\Windows\SysWOW64\at.exeAt 20:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4552
-
-
C:\Windows\SysWOW64\at.exeAt 21:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4072
-
-
C:\Windows\SysWOW64\at.exeAt 22:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:1184
-
-
C:\Windows\SysWOW64\at.exeAt 23:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:568
-
-
C:\Windows\SysWOW64\at.exeAt 24:00 C:\Windows\XXXXXXBA9CE30A\svchsot.exe3⤵PID:4280
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a8708048b03fe68bb7f28c442633d2f6
SHA13f523cfac1766a03975539c3b6be1763231c299f
SHA256096aa79c769256466f285a41fecd0b6e173cb3ea4fede684f5afd4339d43e23b
SHA512ab07c20018e364fb82a1a1770bc5f8b6a93811ca4bffffcc3eb0f1ef7e4d50545bc46fff033b2bf69094a693c0351a34bca756a819246ad3fd423b43dd76e254