Analysis
-
max time kernel
154s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2022, 23:23
Behavioral task
behavioral1
Sample
0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe
Resource
win10v2004-20220812-en
General
-
Target
0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe
-
Size
229KB
-
MD5
3c986235087ff0c87b114c154a163396
-
SHA1
5f3ac273e16c3c3c2df43d469809f7885748220a
-
SHA256
0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82
-
SHA512
412f7cc11fbcc4f68af3f0996ca4a5ee52054c5ac80f5b08e3b661a1746a3bd95ae2d7851f646aa4d6fc28d10947178d8c419d87140ff41aabb3dcd89c4d42d4
-
SSDEEP
6144:XlSyG0+MQNs8Cifew+IUAOvcIAaIKLK2tGLa:1SedQNs8f1seaIKLKGGLa
Malware Config
Signatures
-
Gh0st RAT payload 4 IoCs
resource yara_rule behavioral2/memory/4348-132-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat behavioral2/memory/4348-134-0x0000000000400000-0x000000000043B000-memory.dmp family_gh0strat behavioral2/files/0x000c000000022f5a-133.dat family_gh0strat behavioral2/files/0x000c000000022f5a-135.dat family_gh0strat -
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\FastUserSwitchingCompatibility\Parameters\ServiceDll = "C:\\Windows\\system32\\FastUserSwitchingCompatibilityex.dll" 0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe -
Loads dropped DLL 1 IoCs
pid Process 788 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\FastUserSwitchingCompatibilityex.dll 0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe"C:\Users\Admin\AppData\Local\Temp\0acc8567f8d5e57993cb7513038d27482618586f0c3c63a646437dcf6eb5ee82.exe"1⤵
- Sets DLL path for service in the registry
- Drops file in System32 directory
PID:4348
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k netsvcs -s FastUserSwitchingCompatibility1⤵
- Loads dropped DLL
PID:788
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD50f163d6be15b17cedb5d994e27120811
SHA1c07f28bdd1fa18f260ef5106ab6e3d0c61814195
SHA2562e080397dddc878d84c8d9c66189d4cb01a48ba3443f82b1fb9c276f04b8de17
SHA512149efde634a2f195fc5a0e2272ed731c502c9083927f3ce0ace705c6a53b55553f9a5ffdddd62103056ac48142c13ac40fce2aa9964063ff3248817f7ad70cfb
-
Filesize
96KB
MD50f163d6be15b17cedb5d994e27120811
SHA1c07f28bdd1fa18f260ef5106ab6e3d0c61814195
SHA2562e080397dddc878d84c8d9c66189d4cb01a48ba3443f82b1fb9c276f04b8de17
SHA512149efde634a2f195fc5a0e2272ed731c502c9083927f3ce0ace705c6a53b55553f9a5ffdddd62103056ac48142c13ac40fce2aa9964063ff3248817f7ad70cfb