Analysis
-
max time kernel
132s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2022 15:24
Static task
static1
Behavioral task
behavioral1
Sample
119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe
Resource
win7-20220812-en
General
-
Target
119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe
-
Size
180KB
-
MD5
be8e13e10a6c253e6f5248118dd58a4f
-
SHA1
2de75e27d01154c1400e134f4d5438aa4941bf39
-
SHA256
119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
-
SHA512
6f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
SSDEEP
3072:VmtqxrrQEjmD2e8eo8imNNMiePZ3EiN8Xi5:vrr3Kl838jNMjZ3/NB
Malware Config
Signatures
-
Gh0st RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1156-132-0x0000000010000000-0x0000000010023000-memory.dmp family_gh0strat behavioral2/memory/4904-138-0x0000000010000000-0x0000000010023000-memory.dmp family_gh0strat -
Executes dropped EXE 3 IoCs
pid Process 4904 svchost.exe 2500 svchost.exe 1180 svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\StormII\svchost.exe 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe File created C:\Program Files (x86)\StormII\svchost.exe 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3004 4904 WerFault.exe 83 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1156 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2500 4904 svchost.exe 84 PID 4904 wrote to memory of 2500 4904 svchost.exe 84 PID 4904 wrote to memory of 2500 4904 svchost.exe 84 PID 4904 wrote to memory of 1180 4904 svchost.exe 85 PID 4904 wrote to memory of 1180 4904 svchost.exe 85 PID 4904 wrote to memory of 1180 4904 svchost.exe 85 PID 1156 wrote to memory of 2424 1156 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 89 PID 1156 wrote to memory of 2424 1156 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 89 PID 1156 wrote to memory of 2424 1156 119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe"C:\Users\Admin\AppData\Local\Temp\119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\119C0A~1.EXE > nul2⤵PID:2424
-
-
C:\Program Files (x86)\StormII\svchost.exe"C:\Program Files (x86)\StormII\svchost.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files (x86)\StormII\svchost.exe"C:\Program Files (x86)\StormII\svchost.exe" Win72⤵
- Executes dropped EXE
PID:2500
-
-
C:\Program Files (x86)\StormII\svchost.exe"C:\Program Files (x86)\StormII\svchost.exe" Win72⤵
- Executes dropped EXE
PID:1180
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4904 -s 6162⤵
- Program crash
PID:3004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4904 -ip 49041⤵PID:1388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1
-
Filesize
180KB
MD5be8e13e10a6c253e6f5248118dd58a4f
SHA12de75e27d01154c1400e134f4d5438aa4941bf39
SHA256119c0a8258cc1ff958e6ec9ec8eae9d8e73a50833e01aa6565395464b8e33f7a
SHA5126f20348c4ccae1b820ff9bf5b0a95831fb435489c737005e9d93a125a6c2eb7026708098d4ae2362a5002294a4c72fe31858eb97c98329987105a8a48ee4d4e1