Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
11-10-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe
Resource
win7-20220812-en
General
-
Target
119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe
-
Size
180KB
-
MD5
be8e13e10a6c253e6f5248118dd58a4f
-
SHA1
2de75e27d01154c1400e134f4d5438aa4941bf39
-
SHA256
119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
-
SHA512
6f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
SSDEEP
3072:VmtqxrrQEjmD2e8eo8imNNMiePZ3EiN8Xi5:vrr3Kl838jNMjZ3/NB
Malware Config
Signatures
-
Gh0st RAT payload 1 IoCs
resource yara_rule behavioral1/memory/2020-55-0x0000000010000000-0x0000000010023000-memory.dmp family_gh0strat -
Executes dropped EXE 2 IoCs
pid Process 1588 svchost.exe 1680 svchost.exe -
Deletes itself 1 IoCs
pid Process 1636 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1572 WerFault.exe 1572 WerFault.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\StormII\svchost.exe 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe File opened for modification C:\Program Files (x86)\StormII\svchost.exe 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 1572 1588 WerFault.exe 26 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2020 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1588 wrote to memory of 1680 1588 svchost.exe 27 PID 1588 wrote to memory of 1680 1588 svchost.exe 27 PID 1588 wrote to memory of 1680 1588 svchost.exe 27 PID 1588 wrote to memory of 1680 1588 svchost.exe 27 PID 2020 wrote to memory of 1636 2020 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 28 PID 2020 wrote to memory of 1636 2020 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 28 PID 2020 wrote to memory of 1636 2020 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 28 PID 2020 wrote to memory of 1636 2020 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 28 PID 1588 wrote to memory of 1572 1588 svchost.exe 29 PID 1588 wrote to memory of 1572 1588 svchost.exe 29 PID 1588 wrote to memory of 1572 1588 svchost.exe 29 PID 1588 wrote to memory of 1572 1588 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe"C:\Users\Admin\AppData\Local\Temp\119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\119C0A~1.EXE > nul2⤵
- Deletes itself
PID:1636
-
-
C:\Program Files (x86)\StormII\svchost.exe"C:\Program Files (x86)\StormII\svchost.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Program Files (x86)\StormII\svchost.exe"C:\Program Files (x86)\StormII\svchost.exe" Win72⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1588 -s 2522⤵
- Loads dropped DLL
- Program crash
PID:1572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1